All the vulnerabilites related to Huawei - HarmonyOS
var-202203-0964
Vulnerability from variot
There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability. Huawei of EMUI , HarmonyOS , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0964", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" } ] }, "cve": "CVE-2021-40048", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40048", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401449", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40048", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40048", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40048", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40048", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202203-996", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401449", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "CNNVD", "id": "CNNVD-202203-996" }, { "db": "NVD", "id": "CVE-2021-40048" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability. Huawei of EMUI , HarmonyOS , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "VULHUB", "id": "VHN-401449" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40048", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018716", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-996", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401449", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "CNNVD", "id": "CNNVD-202203-996" }, { "db": "NVD", "id": "CVE-2021-40048" } ] }, "id": "VAR-202203-0964", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401449" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:44:02.419000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=185902" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.1 }, { "problemtype": "Miscalculation of buffer size (CWE-131) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40048" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40048/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "CNNVD", "id": "CNNVD-202203-996" }, { "db": "NVD", "id": "CVE-2021-40048" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "CNNVD", "id": "CNNVD-202203-996" }, { "db": "NVD", "id": "CVE-2021-40048" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401449" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-996" }, { "date": "2022-03-10T17:43:17.003000", "db": "NVD", "id": "CVE-2021-40048" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401449" }, { "date": "2023-07-05T08:12:00", "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-996" }, { "date": "2022-03-14T15:35:36.367000", "db": "NVD", "id": "CVE-2021-40048" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-996" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer size miscalculation vulnerability in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018716" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-996" } ], "trust": 0.6 } }
var-202212-0559
Vulnerability from variot
The backup module has a path traversal vulnerability. Successful exploitation of this vulnerability causes unauthorized access to other system files. EMUI and HarmonyOS Exists in a past traversal vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0559", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "NVD", "id": "CVE-2022-41591" } ] }, "cve": "CVE-2022-41591", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-41591", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41591", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41591", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-41591", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202212-2486", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" }, { "db": "NVD", "id": "CVE-2022-41591" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The backup module has a path traversal vulnerability. Successful exploitation of this vulnerability causes unauthorized access to other system files. EMUI and HarmonyOS Exists in a past traversal vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-41591" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "VULHUB", "id": "VHN-437827" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41591", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-003427", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2486", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437827", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437827" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" }, { "db": "NVD", "id": "CVE-2022-41591" } ] }, "id": "VAR-202212-0559", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437827" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:28.351000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202212-0000001462975397 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=219371" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437827" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "NVD", "id": "CVE-2022-41591" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41591" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41591/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437827" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" }, { "db": "NVD", "id": "CVE-2022-41591" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437827" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" }, { "db": "NVD", "id": "CVE-2022-41591" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-437827" }, { "date": "2023-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2486" }, { "date": "2022-12-20T21:15:10.857000", "db": "NVD", "id": "CVE-2022-41591" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-29T00:00:00", "db": "VULHUB", "id": "VHN-437827" }, { "date": "2023-02-17T01:48:00", "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "date": "2022-12-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2486" }, { "date": "2022-12-29T18:52:39.017000", "db": "NVD", "id": "CVE-2022-41591" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2486" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003427" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2486" } ], "trust": 0.6 } }
var-202201-1055
Vulnerability from variot
The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution. Huawei EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1055", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" } ] }, "cve": "CVE-2021-40010", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40010", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401411", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40010", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40010", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40010", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-40010", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202201-276", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401411", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "CNNVD", "id": "CNNVD-202201-276" }, { "db": "NVD", "id": "CVE-2021-40010" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution. Huawei EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "VULHUB", "id": "VHN-401411" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40010", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002887", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-276", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401411", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "CNNVD", "id": "CNNVD-202201-276" }, { "db": "NVD", "id": "CVE-2021-40010" } ] }, "id": "VAR-202201-1055", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401411" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:43:04.813000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202201-0000001194056366 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177995" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40010" }, { "trust": 0.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "CNNVD", "id": "CNNVD-202201-276" }, { "db": "NVD", "id": "CVE-2021-40010" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "CNNVD", "id": "CNNVD-202201-276" }, { "db": "NVD", "id": "CVE-2021-40010" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401411" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-276" }, { "date": "2022-01-10T14:10:21.360000", "db": "NVD", "id": "CVE-2021-40010" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-30T00:00:00", "db": "VULHUB", "id": "VHN-401411" }, { "date": "2023-01-24T03:05:00", "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "date": "2022-05-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-276" }, { "date": "2022-09-30T13:21:19.767000", "db": "NVD", "id": "CVE-2021-40010" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-276" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002887" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-276" } ], "trust": 0.6 } }
var-202110-1852
Vulnerability from variot
PackageManagerService has a Permissions, Privileges, and Access Controls vulnerability .Successful exploitation of this vulnerability may cause that Third-party apps can obtain the complete list of Harmony apps without permission. HarmonyOS There is a vulnerability in improper default permissions.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1852", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "NVD", "id": "CVE-2021-37132" } ] }, "cve": "CVE-2021-37132", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37132", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398968", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2021-37132", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37132", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37132", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-37132", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2229", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398968", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398968" }, { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "CNNVD", "id": "CNNVD-202110-2229" }, { "db": "NVD", "id": "CVE-2021-37132" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PackageManagerService has a Permissions, Privileges, and Access Controls vulnerability .Successful exploitation of this vulnerability may cause that Third-party apps can obtain the complete list of Harmony apps without permission. HarmonyOS There is a vulnerability in improper default permissions.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37132" }, { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "VULHUB", "id": "VHN-398968" }, { "db": "VULMON", "id": "CVE-2021-37132" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37132", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017296", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2229", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08315", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398968", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37132", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398968" }, { "db": "VULMON", "id": "CVE-2021-37132" }, { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "CNNVD", "id": "CNNVD-202110-2229" }, { "db": "NVD", "id": "CVE-2021-37132" } ] }, "id": "VAR-202110-1852", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398968" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:52.021000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176777" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "CNNVD", "id": "CNNVD-202110-2229" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398968" }, { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "NVD", "id": "CVE-2021-37132" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37132" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398968" }, { "db": "VULMON", "id": "CVE-2021-37132" }, { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "CNNVD", "id": "CNNVD-202110-2229" }, { "db": "NVD", "id": "CVE-2021-37132" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398968" }, { "db": "VULMON", "id": "CVE-2021-37132" }, { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "CNNVD", "id": "CNNVD-202110-2229" }, { "db": "NVD", "id": "CVE-2021-37132" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398968" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37132" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2229" }, { "date": "2022-01-03T22:15:09.747000", "db": "NVD", "id": "CVE-2021-37132" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398968" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37132" }, { "date": "2023-01-13T05:42:00", "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2229" }, { "date": "2022-01-11T20:06:28.397000", "db": "NVD", "id": "CVE-2021-37132" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2229" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability regarding improper default permissions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017296" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2229" } ], "trust": 0.6 } }
var-202107-1677
Vulnerability from variot
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Buffer Overflow in BootROM USB Stack. Affected devices are Huawei Mate 30 Pro (LIO), Huawei P40 Pro (ELS), Huawei P40 (ANA), Huawei Nova 5T (YAL)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1677", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" } ] }, "cve": "CVE-2021-22429", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2021-22429", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-380864", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-22429", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22429", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22429", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-22429", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202107-2228", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380864", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" }, { "db": "NVD", "id": "CVE-2021-22429" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Buffer Overflow in BootROM USB Stack. Affected devices are Huawei Mate 30 Pro (LIO), Huawei P40 Pro (ELS), Huawei P40 (ANA), Huawei Nova 5T (YAL)", "sources": [ { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22429", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018746", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2228", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380864", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22429", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" }, { "db": "NVD", "id": "CVE-2021-22429" } ] }, "id": "VAR-202107-1677", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380864" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:11:16.827000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172015" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22429" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22429/" }, { "trust": 0.1, "url": "https://labs.taszk.io/blog/post/bootrom_usb/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" }, { "db": "NVD", "id": "CVE-2021-22429" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" }, { "db": "NVD", "id": "CVE-2021-22429" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380864" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2228" }, { "date": "2022-02-25T19:15:09.387000", "db": "NVD", "id": "CVE-2021-22429" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380864" }, { "date": "2023-07-06T01:52:00", "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2228" }, { "date": "2022-03-07T17:54:50.527000", "db": "NVD", "id": "CVE-2021-22429" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2228" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018746" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2228" } ], "trust": 0.6 } }
var-202112-0236
Vulnerability from variot
There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. Huawei Smartphones contain an incomplete cleanup vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a resource management error vulnerability in Huawei HarmonyOS, which is caused by a component of the product not properly releasing resources. Vulnerabilities that can be exploited by an attacker affect availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0236", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "NVD", "id": "CVE-2021-37080" } ] }, "cve": "CVE-2021-37080", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37080", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398915", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37080", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37080", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37080", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37080", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2030", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398915", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398915" }, { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "CNNVD", "id": "CNNVD-202109-2030" }, { "db": "NVD", "id": "CVE-2021-37080" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. Huawei Smartphones contain an incomplete cleanup vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a resource management error vulnerability in Huawei HarmonyOS, which is caused by a component of the product not properly releasing resources. Vulnerabilities that can be exploited by an attacker affect availability", "sources": [ { "db": "NVD", "id": "CVE-2021-37080" }, { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "VULHUB", "id": "VHN-398915" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37080", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015949", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2030", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-01680", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398915", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398915" }, { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "CNNVD", "id": "CNNVD-202109-2030" }, { "db": "NVD", "id": "CVE-2021-37080" } ] }, "id": "VAR-202112-0236", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398915" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:23:04.186000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173507" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "CNNVD", "id": "CNNVD-202109-2030" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-459", "trust": 1.1 }, { "problemtype": "incomplete cleanup (CWE-459) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398915" }, { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "NVD", "id": "CVE-2021-37080" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37080" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398915" }, { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "CNNVD", "id": "CNNVD-202109-2030" }, { "db": "NVD", "id": "CVE-2021-37080" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398915" }, { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "CNNVD", "id": "CNNVD-202109-2030" }, { "db": "NVD", "id": "CVE-2021-37080" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398915" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2030" }, { "date": "2021-12-07T17:15:09.310000", "db": "NVD", "id": "CVE-2021-37080" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398915" }, { "date": "2022-12-05T01:56:00", "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2030" }, { "date": "2021-12-09T17:35:32.100000", "db": "NVD", "id": "CVE-2021-37080" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2030" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Incomplete Cleanup Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015949" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2030" } ], "trust": 0.6 } }
var-202110-1246
Vulnerability from variot
A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash. HarmonyOS Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1246", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "NVD", "id": "CVE-2021-22453" } ] }, "cve": "CVE-2021-22453", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22453", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380888", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22453", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22453", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22453", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2021-22453", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202110-2043", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-380888", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380888" }, { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "CNNVD", "id": "CNNVD-202110-2043" }, { "db": "NVD", "id": "CVE-2021-22453" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash. HarmonyOS Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22453" }, { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "VULHUB", "id": "VHN-380888" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22453", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014234", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2043", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380888", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380888" }, { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "CNNVD", "id": "CNNVD-202110-2043" }, { "db": "NVD", "id": "CVE-2021-22453" } ] }, "id": "VAR-202110-1246", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380888" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:23:14.531000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171463" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "CNNVD", "id": "CNNVD-202110-2043" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380888" }, { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "NVD", "id": "CVE-2021-22453" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22453" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380888" }, { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "CNNVD", "id": "CNNVD-202110-2043" }, { "db": "NVD", "id": "CVE-2021-22453" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380888" }, { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "CNNVD", "id": "CNNVD-202110-2043" }, { "db": "NVD", "id": "CVE-2021-22453" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380888" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2043" }, { "date": "2021-10-28T13:15:08.947000", "db": "NVD", "id": "CVE-2021-22453" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380888" }, { "date": "2022-10-11T06:28:00", "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2043" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22453" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2043" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014234" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2043" } ], "trust": 0.6 } }
var-202212-0650
Vulnerability from variot
The kernel module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may cause memory overwriting. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0650", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "NVD", "id": "CVE-2022-46320" } ] }, "cve": "CVE-2022-46320", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-46320", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46320", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46320", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-46320", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202212-2506", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "CNNVD", "id": "CNNVD-202212-2506" }, { "db": "NVD", "id": "CVE-2022-46320" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may cause memory overwriting. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46320" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "VULHUB", "id": "VHN-444290" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46320", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024016", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2506", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444290", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444290" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "CNNVD", "id": "CNNVD-202212-2506" }, { "db": "NVD", "id": "CVE-2022-46320" } ] }, "id": "VAR-202212-0650", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444290" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:42:14.829000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218956" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444290" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "NVD", "id": "CVE-2022-46320" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46320" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46320/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444290" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "CNNVD", "id": "CNNVD-202212-2506" }, { "db": "NVD", "id": "CVE-2022-46320" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444290" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "CNNVD", "id": "CNNVD-202212-2506" }, { "db": "NVD", "id": "CVE-2022-46320" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444290" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2506" }, { "date": "2022-12-20T21:15:11.647000", "db": "NVD", "id": "CVE-2022-46320" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444290" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2506" }, { "date": "2022-12-24T04:16:20.820000", "db": "NVD", "id": "CVE-2022-46320" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2506" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024016" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2506" } ], "trust": 0.6 } }
var-202210-0401
Vulnerability from variot
The HwAirlink module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause information leakage
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0401", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38981" } ] }, "cve": "CVE-2022-38981", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38981", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38981", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-147", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-147" }, { "db": "NVD", "id": "CVE-2022-38981" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwAirlink module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause information leakage", "sources": [ { "db": "NVD", "id": "CVE-2022-38981" }, { "db": "VULHUB", "id": "VHN-434760" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38981", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-147", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434760", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434760" }, { "db": "CNNVD", "id": "CNNVD-202210-147" }, { "db": "NVD", "id": "CVE-2022-38981" } ] }, "id": "VAR-202210-0401", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434760" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:00:44.925000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211144" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-147" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434760" }, { "db": "NVD", "id": "CVE-2022-38981" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38981/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434760" }, { "db": "CNNVD", "id": "CNNVD-202210-147" }, { "db": "NVD", "id": "CVE-2022-38981" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434760" }, { "db": "CNNVD", "id": "CNNVD-202210-147" }, { "db": "NVD", "id": "CVE-2022-38981" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434760" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-147" }, { "date": "2022-10-14T16:15:13.937000", "db": "NVD", "id": "CVE-2022-38981" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434760" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-147" }, { "date": "2022-10-18T12:32:32.240000", "db": "NVD", "id": "CVE-2022-38981" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-147" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-147" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-147" } ], "trust": 0.6 } }
var-202107-0371
Vulnerability from variot
A component of the HarmonyOS 2.0 has a Null Pointer Dereference Vulnerability. Local attackers may exploit this vulnerability to cause system denial of service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-0371", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22318" } ] }, "cve": "CVE-2021-22318", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22318", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380753", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22318", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22318", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202107-1014", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380753", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22318", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380753" }, { "db": "VULMON", "id": "CVE-2021-22318" }, { "db": "CNNVD", "id": "CNNVD-202107-1014" }, { "db": "NVD", "id": "CVE-2021-22318" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS 2.0 has a Null Pointer Dereference Vulnerability. Local attackers may exploit this vulnerability to cause system denial of service", "sources": [ { "db": "NVD", "id": "CVE-2021-22318" }, { "db": "VULHUB", "id": "VHN-380753" }, { "db": "VULMON", "id": "CVE-2021-22318" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22318", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202107-1014", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380753", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22318", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380753" }, { "db": "VULMON", "id": "CVE-2021-22318" }, { "db": "CNNVD", "id": "CNNVD-202107-1014" }, { "db": "NVD", "id": "CVE-2021-22318" } ] }, "id": "VAR-202107-0371", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380753" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:47.597000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380753" }, { "db": "NVD", "id": "CVE-2021-22318" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/cn/console/safetydetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pagesize=10\u0026pageindex=1" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22318" }, { "trust": 0.1, "url": "https://device.harmonyos.com/cn/console/safetydetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026amp;pagesize=10\u0026amp;pageindex=1" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/476.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380753" }, { "db": "VULMON", "id": "CVE-2021-22318" }, { "db": "CNNVD", "id": "CNNVD-202107-1014" }, { "db": "NVD", "id": "CVE-2021-22318" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380753" }, { "db": "VULMON", "id": "CVE-2021-22318" }, { "db": "CNNVD", "id": "CNNVD-202107-1014" }, { "db": "NVD", "id": "CVE-2021-22318" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-14T00:00:00", "db": "VULHUB", "id": "VHN-380753" }, { "date": "2021-07-14T00:00:00", "db": "VULMON", "id": "CVE-2021-22318" }, { "date": "2021-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-1014" }, { "date": "2021-07-14T11:15:07.710000", "db": "NVD", "id": "CVE-2021-22318" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-15T00:00:00", "db": "VULHUB", "id": "VHN-380753" }, { "date": "2021-07-15T00:00:00", "db": "VULMON", "id": "CVE-2021-22318" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-1014" }, { "date": "2021-07-15T23:50:07.887000", "db": "NVD", "id": "CVE-2021-22318" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-1014" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Code problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-1014" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-1014" } ], "trust": 0.6 } }
var-202204-0964
Vulnerability from variot
The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0964", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" } ] }, "cve": "CVE-2021-40065", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40065", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401466", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40065", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40065", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40065", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40065", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202204-2027", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401466", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-40065", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" }, { "db": "NVD", "id": "CVE-2021-40065" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40065", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-019278", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2027", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-53579", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401466", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40065", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" }, { "db": "NVD", "id": "CVE-2021-40065" } ] }, "id": "VAR-202204-0964", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401466" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:01:04.721000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=189574" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40065" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40065/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" }, { "db": "NVD", "id": "CVE-2021-40065" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" }, { "db": "NVD", "id": "CVE-2021-40065" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-401466" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2021-40065" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2027" }, { "date": "2022-04-11T20:15:15.987000", "db": "NVD", "id": "CVE-2021-40065" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-15T00:00:00", "db": "VULHUB", "id": "VHN-401466" }, { "date": "2022-04-15T00:00:00", "db": "VULMON", "id": "CVE-2021-40065" }, { "date": "2023-07-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "date": "2022-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2027" }, { "date": "2022-04-15T19:35:37.037000", "db": "NVD", "id": "CVE-2021-40065" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2027" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019278" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2027" } ], "trust": 0.6 } }
var-202302-0467
Vulnerability from variot
The geofencing kernel code does not verify the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access. EMUI and HarmonyOS contains a vulnerability related to improper validation of quantities specified in inputs.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0467", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "NVD", "id": "CVE-2022-48298" } ] }, "cve": "CVE-2022-48298", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-48298", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48298", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48298", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-48298", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202302-350", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "CNNVD", "id": "CNNVD-202302-350" }, { "db": "NVD", "id": "CVE-2022-48298" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The geofencing kernel code does not verify the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access. EMUI and HarmonyOS contains a vulnerability related to improper validation of quantities specified in inputs.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48298" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "VULHUB", "id": "VHN-453378" }, { "db": "VULMON", "id": "CVE-2022-48298" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48298", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003383", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-350", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453378", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48298", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453378" }, { "db": "VULMON", "id": "CVE-2022-48298" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "CNNVD", "id": "CNNVD-202302-350" }, { "db": "NVD", "id": "CVE-2022-48298" } ] }, "id": "VAR-202302-0467", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453378" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:54:58.840000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225751" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-1284", "trust": 1.0 }, { "problemtype": "Improper validation of quantity specified in input (CWE-1284) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453378" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "NVD", "id": "CVE-2022-48298" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48298" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48298/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453378" }, { "db": "VULMON", "id": "CVE-2022-48298" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "CNNVD", "id": "CNNVD-202302-350" }, { "db": "NVD", "id": "CVE-2022-48298" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453378" }, { "db": "VULMON", "id": "CVE-2022-48298" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "CNNVD", "id": "CNNVD-202302-350" }, { "db": "NVD", "id": "CVE-2022-48298" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453378" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48298" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-350" }, { "date": "2023-02-09T17:15:14.687000", "db": "NVD", "id": "CVE-2022-48298" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453378" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48298" }, { "date": "2023-09-07T01:58:00", "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-350" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-48298" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-350" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Validation of Quantities Specified in Inputs in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003383" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-350" } ], "trust": 0.6 } }
var-202112-0946
Vulnerability from variot
The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end. HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0946", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "NVD", "id": "CVE-2021-40000" } ] }, "cve": "CVE-2021-40000", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CVE-2021-40000", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CNVD-2022-05172", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "VHN-401401", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-40000", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40000", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40000", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40000", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2022-05172", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202112-212", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401401", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "VULHUB", "id": "VHN-401401" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "CNNVD", "id": "CNNVD-202112-212" }, { "db": "NVD", "id": "CVE-2021-40000" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end. HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40000" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "VULHUB", "id": "VHN-401401" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40000", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017441", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-212", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-05172", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401401", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "VULHUB", "id": "VHN-401401" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "CNNVD", "id": "CNNVD-202112-212" }, { "db": "NVD", "id": "CVE-2021-40000" } ] }, "id": "VAR-202112-0946", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "VULHUB", "id": "VHN-401401" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05172" } ] }, "last_update_date": "2024-08-14T14:37:44.837000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Huawei HarmonyOS Wearables Out-of-bounds Write Vulnerability (CNVD-2022-05172)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/315086" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172736" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "CNNVD", "id": "CNNVD-202112-212" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401401" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "NVD", "id": "CVE-2021-40000" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40000" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "VULHUB", "id": "VHN-401401" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "CNNVD", "id": "CNNVD-202112-212" }, { "db": "NVD", "id": "CVE-2021-40000" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "VULHUB", "id": "VHN-401401" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "CNNVD", "id": "CNNVD-202112-212" }, { "db": "NVD", "id": "CVE-2021-40000" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05172" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401401" }, { "date": "2023-01-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-212" }, { "date": "2022-01-10T14:10:20.937000", "db": "NVD", "id": "CVE-2021-40000" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05172" }, { "date": "2022-01-12T00:00:00", "db": "VULHUB", "id": "VHN-401401" }, { "date": "2023-01-18T06:06:00", "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-212" }, { "date": "2022-01-12T21:35:33.953000", "db": "NVD", "id": "CVE-2021-40000" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-212" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017441" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-212" } ], "trust": 0.6 } }
var-202111-1782
Vulnerability from variot
The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1782", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "NVD", "id": "CVE-2021-39988" } ] }, "cve": "CVE-2021-39988", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-39988", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401389", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-39988", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39988", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39988", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39988", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-2124", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401389", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401389" }, { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "CNNVD", "id": "CNNVD-202111-2124" }, { "db": "NVD", "id": "CVE-2021-39988" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-39988" }, { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "VULHUB", "id": "VHN-401389" }, { "db": "VULMON", "id": "CVE-2021-39988" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39988", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017726", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2124", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08311", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401389", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39988", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401389" }, { "db": "VULMON", "id": "CVE-2021-39988" }, { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "CNNVD", "id": "CNNVD-202111-2124" }, { "db": "NVD", "id": "CVE-2021-39988" } ] }, "id": "VAR-202111-1782", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401389" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:27:33.954000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176785" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "CNNVD", "id": "CNNVD-202111-2124" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401389" }, { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "NVD", "id": "CVE-2021-39988" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39988" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401389" }, { "db": "VULMON", "id": "CVE-2021-39988" }, { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "CNNVD", "id": "CNNVD-202111-2124" }, { "db": "NVD", "id": "CVE-2021-39988" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401389" }, { "db": "VULMON", "id": "CVE-2021-39988" }, { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "CNNVD", "id": "CNNVD-202111-2124" }, { "db": "NVD", "id": "CVE-2021-39988" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401389" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39988" }, { "date": "2023-02-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2124" }, { "date": "2022-01-03T22:15:10.937000", "db": "NVD", "id": "CVE-2021-39988" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-14T00:00:00", "db": "VULHUB", "id": "VHN-401389" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39988" }, { "date": "2023-02-02T02:27:00", "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2124" }, { "date": "2022-01-14T15:56:02.800000", "db": "NVD", "id": "CVE-2021-39988" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2124" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017726" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2124" } ], "trust": 0.6 } }
var-202111-0874
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0874", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "NVD", "id": "CVE-2021-37019" } ] }, "cve": "CVE-2021-37019", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37019", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398851", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37019", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37019", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37019", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37019", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1887", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398851", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398851" }, { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "CNNVD", "id": "CNNVD-202111-1887" }, { "db": "NVD", "id": "CVE-2021-37019" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37019" }, { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "VULHUB", "id": "VHN-398851" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37019", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015579", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1887", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398851", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398851" }, { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "CNNVD", "id": "CNNVD-202111-1887" }, { "db": "NVD", "id": "CVE-2021-37019" } ] }, "id": "VAR-202111-0874", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398851" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:50:04.329000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172186" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "CNNVD", "id": "CNNVD-202111-1887" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398851" }, { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "NVD", "id": "CVE-2021-37019" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37019" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398851" }, { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "CNNVD", "id": "CNNVD-202111-1887" }, { "db": "NVD", "id": "CVE-2021-37019" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398851" }, { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "CNNVD", "id": "CNNVD-202111-1887" }, { "db": "NVD", "id": "CVE-2021-37019" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398851" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1887" }, { "date": "2021-11-23T16:15:09.410000", "db": "NVD", "id": "CVE-2021-37019" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398851" }, { "date": "2022-11-24T08:51:00", "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1887" }, { "date": "2021-11-29T18:59:17.893000", "db": "NVD", "id": "CVE-2021-37019" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1887" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015579" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1887" } ], "trust": 0.6 } }
var-202212-0384
Vulnerability from variot
The HAware module has a function logic error. Successful exploitation of this vulnerability will affect the account removal function in Settings. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0384", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "NVD", "id": "CVE-2022-46318" } ] }, "cve": "CVE-2022-46318", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-46318", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46318", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46318", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-46318", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202212-2482", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "CNNVD", "id": "CNNVD-202212-2482" }, { "db": "NVD", "id": "CVE-2022-46318" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HAware module has a function logic error. Successful exploitation of this vulnerability will affect the account removal function in Settings. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-46318" }, { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "VULHUB", "id": "VHN-444288" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46318", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024013", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2482", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444288", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444288" }, { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "CNNVD", "id": "CNNVD-202212-2482" }, { "db": "NVD", "id": "CVE-2022-46318" } ] }, "id": "VAR-202212-0384", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444288" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:02:12.568000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218472" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "NVD", "id": "CVE-2022-46318" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46318" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46318/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444288" }, { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "CNNVD", "id": "CNNVD-202212-2482" }, { "db": "NVD", "id": "CVE-2022-46318" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444288" }, { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "CNNVD", "id": "CNNVD-202212-2482" }, { "db": "NVD", "id": "CVE-2022-46318" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444288" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2482" }, { "date": "2022-12-20T21:15:11.547000", "db": "NVD", "id": "CVE-2022-46318" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444288" }, { "date": "2023-12-01T02:32:00", "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2482" }, { "date": "2022-12-24T04:15:49.883000", "db": "NVD", "id": "CVE-2022-46318" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2482" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024013" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2482" } ], "trust": 0.6 } }
var-202210-0124
Vulnerability from variot
The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0124", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41585" } ] }, "cve": "CVE-2022-41585", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-41585", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41585", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-179", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-179" }, { "db": "NVD", "id": "CVE-2022-41585" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting", "sources": [ { "db": "NVD", "id": "CVE-2022-41585" }, { "db": "VULHUB", "id": "VHN-437818" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41585", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-179", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437818", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437818" }, { "db": "CNNVD", "id": "CNNVD-202210-179" }, { "db": "NVD", "id": "CVE-2022-41585" } ] }, "id": "VAR-202210-0124", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437818" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:37:17.207000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211157" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437818" }, { "db": "NVD", "id": "CVE-2022-41585" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41585/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437818" }, { "db": "CNNVD", "id": "CNNVD-202210-179" }, { "db": "NVD", "id": "CVE-2022-41585" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437818" }, { "db": "CNNVD", "id": "CNNVD-202210-179" }, { "db": "NVD", "id": "CVE-2022-41585" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437818" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-179" }, { "date": "2022-10-14T16:15:23.770000", "db": "NVD", "id": "CVE-2022-41585" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437818" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-179" }, { "date": "2022-10-18T17:22:58.810000", "db": "NVD", "id": "CVE-2022-41585" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-179" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-179" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-179" } ], "trust": 0.6 } }
var-202210-0289
Vulnerability from variot
The home screen module has a vulnerability in service logic processing.Successful exploitation of this vulnerability may affect data integrity
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0289", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41588" } ] }, "cve": "CVE-2022-41588", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-41588", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41588", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-160", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-160" }, { "db": "NVD", "id": "CVE-2022-41588" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The home screen module has a vulnerability in service logic processing.Successful exploitation of this vulnerability may affect data integrity", "sources": [ { "db": "NVD", "id": "CVE-2022-41588" }, { "db": "VULHUB", "id": "VHN-437821" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41588", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-160", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437821", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437821" }, { "db": "CNNVD", "id": "CNNVD-202210-160" }, { "db": "NVD", "id": "CVE-2022-41588" } ] }, "id": "VAR-202210-0289", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437821" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:30.930000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211146" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41588" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41588/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437821" }, { "db": "CNNVD", "id": "CNNVD-202210-160" }, { "db": "NVD", "id": "CVE-2022-41588" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437821" }, { "db": "CNNVD", "id": "CNNVD-202210-160" }, { "db": "NVD", "id": "CVE-2022-41588" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437821" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-160" }, { "date": "2022-10-14T16:15:25.250000", "db": "NVD", "id": "CVE-2022-41588" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437821" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-160" }, { "date": "2022-10-18T17:11:45.423000", "db": "NVD", "id": "CVE-2022-41588" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-160" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-160" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-160" } ], "trust": 0.6 } }
var-202112-0238
Vulnerability from variot
There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart. plural Huawei A code injection vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0238", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" } ] }, "cve": "CVE-2021-37097", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37097", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398933", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37097", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37097", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37097", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37097", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2062", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398933", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" }, { "db": "NVD", "id": "CVE-2021-37097" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart. plural Huawei A code injection vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "VULHUB", "id": "VHN-398933" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37097", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015868", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2062", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398933", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" }, { "db": "NVD", "id": "CVE-2021-37097" } ] }, "id": "VAR-202112-0238", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398933" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:11:10.208000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "OOM\u00a0vulnerability\u00a0with\u00a0the\u00a0system\u00a0framework\u00a0code\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for code injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173805" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "Code injection (CWE-94) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37097" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" }, { "db": "NVD", "id": "CVE-2021-37097" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" }, { "db": "NVD", "id": "CVE-2021-37097" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398933" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2062" }, { "date": "2021-12-08T15:15:10.023000", "db": "NVD", "id": "CVE-2021-37097" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-15T00:00:00", "db": "VULHUB", "id": "VHN-398933" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2062" }, { "date": "2021-12-15T13:47:44.103000", "db": "NVD", "id": "CVE-2021-37097" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2062" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Code injection vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015868" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2062" } ], "trust": 0.6 } }
var-202112-0242
Vulnerability from variot
There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the detection result is tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0242", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "NVD", "id": "CVE-2021-37073" } ] }, "cve": "CVE-2021-37073", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2021-37073", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-398907", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "id": "CVE-2021-37073", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.7, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37073", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37073", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2021-37073", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202109-2031", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-398907", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398907" }, { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "CNNVD", "id": "CNNVD-202109-2031" }, { "db": "NVD", "id": "CVE-2021-37073" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the detection result is tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-37073" }, { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "VULHUB", "id": "VHN-398907" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37073", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015958", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2031", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398907", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398907" }, { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "CNNVD", "id": "CNNVD-202109-2031" }, { "db": "NVD", "id": "CVE-2021-37073" } ] }, "id": "VAR-202112-0242", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398907" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:36.825000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173508" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "CNNVD", "id": "CNNVD-202109-2031" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398907" }, { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "NVD", "id": "CVE-2021-37073" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37073" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398907" }, { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "CNNVD", "id": "CNNVD-202109-2031" }, { "db": "NVD", "id": "CVE-2021-37073" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398907" }, { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "CNNVD", "id": "CNNVD-202109-2031" }, { "db": "NVD", "id": "CVE-2021-37073" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398907" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2031" }, { "date": "2021-12-07T17:15:09.097000", "db": "NVD", "id": "CVE-2021-37073" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398907" }, { "date": "2022-12-05T02:41:00", "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2031" }, { "date": "2021-12-09T17:36:45.333000", "db": "NVD", "id": "CVE-2021-37073" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2031" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Race Condition Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015958" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2031" } ], "trust": 0.6 } }
var-202112-0951
Vulnerability from variot
HwPCAssistant has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in a past traversal vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0951", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "NVD", "id": "CVE-2021-40003" } ] }, "cve": "CVE-2021-40003", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40003", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401404", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2021-40003", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-40003", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40003", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-40003", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202112-207", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401404", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401404" }, { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "CNNVD", "id": "CNNVD-202112-207" }, { "db": "NVD", "id": "CVE-2021-40003" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HwPCAssistant has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in a past traversal vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40003" }, { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "VULHUB", "id": "VHN-401404" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40003", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-017521", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-207", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401404", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401404" }, { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "CNNVD", "id": "CNNVD-202112-207" }, { "db": "NVD", "id": "CVE-2021-40003" } ] }, "id": "VAR-202112-0951", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401404" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:56.392000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172731" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "CNNVD", "id": "CNNVD-202112-207" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401404" }, { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "NVD", "id": "CVE-2021-40003" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40003" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202112-0000001183296718" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401404" }, { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "CNNVD", "id": "CNNVD-202112-207" }, { "db": "NVD", "id": "CVE-2021-40003" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401404" }, { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "CNNVD", "id": "CNNVD-202112-207" }, { "db": "NVD", "id": "CVE-2021-40003" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401404" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-207" }, { "date": "2022-01-10T14:10:21.093000", "db": "NVD", "id": "CVE-2021-40003" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401404" }, { "date": "2023-01-24T05:54:00", "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-207" }, { "date": "2022-01-13T15:52:49", "db": "NVD", "id": "CVE-2021-40003" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-207" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017521" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-207" } ], "trust": 0.6 } }
var-202208-0666
Vulnerability from variot
The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0666", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" } ] }, "cve": "CVE-2022-37002", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-37002", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-37002", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-37002", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-37002", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202208-2399", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" }, { "db": "NVD", "id": "CVE-2022-37002" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37002", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014554", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2399", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427494", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37002", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" }, { "db": "NVD", "id": "CVE-2022-37002" } ] }, "id": "VAR-202208-0666", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427494" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:05.653000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=204369" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37002" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37002/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" }, { "db": "NVD", "id": "CVE-2022-37002" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" }, { "db": "NVD", "id": "CVE-2022-37002" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427494" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37002" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2399" }, { "date": "2022-08-10T20:16:03.777000", "db": "NVD", "id": "CVE-2022-37002" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427494" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37002" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2399" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-37002" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2399" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014554" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2399" } ], "trust": 0.6 } }
var-202110-1854
Vulnerability from variot
There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1854", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" } ] }, "cve": "CVE-2021-37119", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37119", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398955", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37119", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37119", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37119", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37119", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2227", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398955", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" }, { "db": "NVD", "id": "CVE-2021-37119" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37119", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017299", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2227", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-04709", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398955", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" }, { "db": "NVD", "id": "CVE-2021-37119" } ] }, "id": "VAR-202110-1854", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398955" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:25:08.616000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Service\u00a0logic\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176775" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37119" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" }, { "db": "NVD", "id": "CVE-2021-37119" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" }, { "db": "NVD", "id": "CVE-2021-37119" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398955" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37119" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2227" }, { "date": "2022-01-03T22:15:09.450000", "db": "NVD", "id": "CVE-2021-37119" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398955" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37119" }, { "date": "2023-01-13T06:15:00", "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2227" }, { "date": "2022-01-11T19:58:15.363000", "db": "NVD", "id": "CVE-2021-37119" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2227" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2227" } ], "trust": 0.6 } }
var-202209-0306
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0306", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" } ] }, "cve": "CVE-2022-38992", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38992", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38992", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38992", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-38992", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-181", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "CNNVD", "id": "CNNVD-202209-181" }, { "db": "NVD", "id": "CVE-2022-38992" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "VULHUB", "id": "VHN-428511" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38992", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016787", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-181", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428511", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428511" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "CNNVD", "id": "CNNVD-202209-181" }, { "db": "NVD", "id": "CVE-2022-38992" } ] }, "id": "VAR-202209-0306", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428511" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:02:23.054000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208085" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38992" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38992/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428511" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "CNNVD", "id": "CNNVD-202209-181" }, { "db": "NVD", "id": "CVE-2022-38992" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428511" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "CNNVD", "id": "CNNVD-202209-181" }, { "db": "NVD", "id": "CVE-2022-38992" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428511" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-181" }, { "date": "2022-09-16T18:15:17.630000", "db": "NVD", "id": "CVE-2022-38992" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428511" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-181" }, { "date": "2022-09-17T03:46:53.047000", "db": "NVD", "id": "CVE-2022-38992" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-181" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-181" } ], "trust": 0.6 } }
var-202111-0846
Vulnerability from variot
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause Information Disclosure or Denial of Service. Huawei Smartphones contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the fact that the program does not check the message
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0846", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "NVD", "id": "CVE-2021-37016" } ] }, "cve": "CVE-2021-37016", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37016", "impactScore": 7.8, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398848", "impactScore": 7.8, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37016", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37016", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37016", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37016", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202111-1885", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398848", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398848" }, { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "CNNVD", "id": "CNNVD-202111-1885" }, { "db": "NVD", "id": "CVE-2021-37016" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause Information Disclosure or Denial of Service. Huawei Smartphones contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the fact that the program does not check the message", "sources": [ { "db": "NVD", "id": "CVE-2021-37016" }, { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "VULHUB", "id": "VHN-398848" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37016", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015583", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1885", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102855", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398848", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398848" }, { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "CNNVD", "id": "CNNVD-202111-1885" }, { "db": "NVD", "id": "CVE-2021-37016" } ] }, "id": "VAR-202111-0846", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398848" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:37.970000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172184" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "CNNVD", "id": "CNNVD-202111-1885" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398848" }, { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "NVD", "id": "CVE-2021-37016" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37016" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398848" }, { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "CNNVD", "id": "CNNVD-202111-1885" }, { "db": "NVD", "id": "CVE-2021-37016" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398848" }, { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "CNNVD", "id": "CNNVD-202111-1885" }, { "db": "NVD", "id": "CVE-2021-37016" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398848" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1885" }, { "date": "2021-11-23T16:15:09.287000", "db": "NVD", "id": "CVE-2021-37016" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398848" }, { "date": "2022-11-24T09:00:00", "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1885" }, { "date": "2021-11-29T15:27:09.597000", "db": "NVD", "id": "CVE-2021-37016" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1885" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015583" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1885" } ], "trust": 0.6 } }
var-202212-0649
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0649", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "NVD", "id": "CVE-2022-46326" } ] }, "cve": "CVE-2022-46326", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-46326", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46326", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46326", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-46326", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202212-2513", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "CNNVD", "id": "CNNVD-202212-2513" }, { "db": "NVD", "id": "CVE-2022-46326" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46326" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "VULHUB", "id": "VHN-444296" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46326", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024017", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2513", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444296", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444296" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "CNNVD", "id": "CNNVD-202212-2513" }, { "db": "NVD", "id": "CVE-2022-46326" } ] }, "id": "VAR-202212-0649", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444296" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:26:57.616000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218959" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444296" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "NVD", "id": "CVE-2022-46326" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46326" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46326/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444296" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "CNNVD", "id": "CNNVD-202212-2513" }, { "db": "NVD", "id": "CVE-2022-46326" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444296" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "CNNVD", "id": "CNNVD-202212-2513" }, { "db": "NVD", "id": "CVE-2022-46326" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444296" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2513" }, { "date": "2022-12-20T21:15:11.937000", "db": "NVD", "id": "CVE-2022-46326" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444296" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2513" }, { "date": "2022-12-24T04:17:06.690000", "db": "NVD", "id": "CVE-2022-46326" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2513" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024017" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2513" } ], "trust": 0.6 } }
var-202112-0234
Vulnerability from variot
There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to motionhub crash. Huawei Smartphones contain a race condition vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0234", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "NVD", "id": "CVE-2021-37082" } ] }, "cve": "CVE-2021-37082", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2021-37082", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-398917", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "id": "CVE-2021-37082", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37082", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37082", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-37082", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202109-2058", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398917", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398917" }, { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "CNNVD", "id": "CNNVD-202109-2058" }, { "db": "NVD", "id": "CVE-2021-37082" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to motionhub crash. Huawei Smartphones contain a race condition vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37082" }, { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "VULHUB", "id": "VHN-398917" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37082", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015947", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2058", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-01678", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398917", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398917" }, { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "CNNVD", "id": "CNNVD-202109-2058" }, { "db": "NVD", "id": "CVE-2021-37082" } ] }, "id": "VAR-202112-0234", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398917" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:44:12.938000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173526" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "CNNVD", "id": "CNNVD-202109-2058" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398917" }, { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "NVD", "id": "CVE-2021-37082" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37082" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398917" }, { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "CNNVD", "id": "CNNVD-202109-2058" }, { "db": "NVD", "id": "CVE-2021-37082" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398917" }, { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "CNNVD", "id": "CNNVD-202109-2058" }, { "db": "NVD", "id": "CVE-2021-37082" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398917" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2058" }, { "date": "2021-12-07T17:15:09.393000", "db": "NVD", "id": "CVE-2021-37082" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398917" }, { "date": "2022-12-05T01:44:00", "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2058" }, { "date": "2021-12-09T17:35:11.540000", "db": "NVD", "id": "CVE-2021-37082" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2058" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Race Condition Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015947" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2058" } ], "trust": 0.6 } }
var-202212-0915
Vulnerability from variot
Some smartphones have the input validation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0915", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "NVD", "id": "CVE-2022-46328" } ] }, "cve": "CVE-2022-46328", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-46328", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46328", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46328", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-46328", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202212-2510", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "CNNVD", "id": "CNNVD-202212-2510" }, { "db": "NVD", "id": "CVE-2022-46328" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the input validation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-46328" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "VULHUB", "id": "VHN-444298" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46328", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023891", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2510", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444298", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444298" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "CNNVD", "id": "CNNVD-202212-2510" }, { "db": "NVD", "id": "CVE-2022-46328" } ] }, "id": "VAR-202212-0915", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444298" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:17.321000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218957" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444298" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "NVD", "id": "CVE-2022-46328" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46328" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46328/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444298" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "CNNVD", "id": "CNNVD-202212-2510" }, { "db": "NVD", "id": "CVE-2022-46328" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444298" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "CNNVD", "id": "CNNVD-202212-2510" }, { "db": "NVD", "id": "CVE-2022-46328" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444298" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2510" }, { "date": "2022-12-20T21:15:12.037000", "db": "NVD", "id": "CVE-2022-46328" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444298" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2510" }, { "date": "2022-12-24T04:16:40.063000", "db": "NVD", "id": "CVE-2022-46328" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2510" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023891" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2510" } ], "trust": 0.6 } }
var-202210-0126
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0126", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "NVD", "id": "CVE-2022-41603" } ] }, "cve": "CVE-2022-41603", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "id": "CVE-2022-41603", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41603", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41603", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2022-41603", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202210-159", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "CNNVD", "id": "CNNVD-202210-159" }, { "db": "NVD", "id": "CVE-2022-41603" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41603" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "VULHUB", "id": "VHN-437851" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41603", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018785", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-159", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437851", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437851" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "CNNVD", "id": "CNNVD-202210-159" }, { "db": "NVD", "id": "CVE-2022-41603" } ] }, "id": "VAR-202210-0126", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437851" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:00:45.458000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210793" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437851" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "NVD", "id": "CVE-2022-41603" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41603" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41603/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437851" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "CNNVD", "id": "CNNVD-202210-159" }, { "db": "NVD", "id": "CVE-2022-41603" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437851" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "CNNVD", "id": "CNNVD-202210-159" }, { "db": "NVD", "id": "CVE-2022-41603" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437851" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-159" }, { "date": "2022-10-14T16:15:30.267000", "db": "NVD", "id": "CVE-2022-41603" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437851" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-159" }, { "date": "2022-10-15T01:58:15.223000", "db": "NVD", "id": "CVE-2022-41603" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-159" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018785" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-159" } ], "trust": 0.6 } }
var-202211-0874
Vulnerability from variot
The preset launcher module has a permission verification vulnerability. Successful exploitation of this vulnerability makes unauthorized apps add arbitrary widgets and shortcuts without interaction
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0874", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44561" } ] }, "cve": "CVE-2022-44561", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-44561", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44561", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2467", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2467" }, { "db": "NVD", "id": "CVE-2022-44561" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The preset launcher module has a permission verification vulnerability. Successful exploitation of this vulnerability makes unauthorized apps add arbitrary widgets and shortcuts without interaction", "sources": [ { "db": "NVD", "id": "CVE-2022-44561" }, { "db": "VULHUB", "id": "VHN-441951" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44561", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2467", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441951", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441951" }, { "db": "CNNVD", "id": "CNNVD-202211-2467" }, { "db": "NVD", "id": "CVE-2022-44561" } ] }, "id": "VAR-202211-0874", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441951" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:22.111000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=214623" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441951" }, { "db": "NVD", "id": "CVE-2022-44561" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44561/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441951" }, { "db": "CNNVD", "id": "CNNVD-202211-2467" }, { "db": "NVD", "id": "CVE-2022-44561" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441951" }, { "db": "CNNVD", "id": "CNNVD-202211-2467" }, { "db": "NVD", "id": "CVE-2022-44561" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441951" }, { "date": "2022-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2467" }, { "date": "2022-11-09T21:15:18.863000", "db": "NVD", "id": "CVE-2022-44561" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-17T00:00:00", "db": "VULHUB", "id": "VHN-441951" }, { "date": "2022-11-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2467" }, { "date": "2022-11-17T22:20:06.457000", "db": "NVD", "id": "CVE-2022-44561" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2467" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei EMUI Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2467" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2467" } ], "trust": 0.6 } }
var-202110-1432
Vulnerability from variot
A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause System functions which are unavailable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1432", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "NVD", "id": "CVE-2021-22459" } ] }, "cve": "CVE-2021-22459", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22459", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380894", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22459", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22459", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22459", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22459", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2051", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380894", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380894" }, { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "CNNVD", "id": "CNNVD-202110-2051" }, { "db": "NVD", "id": "CVE-2021-22459" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause System functions which are unavailable", "sources": [ { "db": "NVD", "id": "CVE-2021-22459" }, { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "VULHUB", "id": "VHN-380894" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22459", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014465", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2051", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380894", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380894" }, { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "CNNVD", "id": "CNNVD-202110-2051" }, { "db": "NVD", "id": "CVE-2021-22459" } ] }, "id": "VAR-202110-1432", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380894" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:33:02.189000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171498" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "CNNVD", "id": "CNNVD-202110-2051" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380894" }, { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "NVD", "id": "CVE-2021-22459" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22459" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380894" }, { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "CNNVD", "id": "CNNVD-202110-2051" }, { "db": "NVD", "id": "CVE-2021-22459" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380894" }, { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "CNNVD", "id": "CNNVD-202110-2051" }, { "db": "NVD", "id": "CVE-2021-22459" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380894" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2051" }, { "date": "2021-10-28T13:15:09.190000", "db": "NVD", "id": "CVE-2021-22459" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380894" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2051" }, { "date": "2021-11-02T12:58:33.977000", "db": "NVD", "id": "CVE-2021-22459" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2051" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014465" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2051" } ], "trust": 0.6 } }
var-202111-1764
Vulnerability from variot
There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei A vulnerability related to improper default permissions exists in smartphone products.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a sensitive information disclosure vulnerability in the Huawei HarmonyOS SIM dual card management component. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1764", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" } ] }, "cve": "CVE-2021-39967", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-39967", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401368", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-39967", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39967", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39967", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39967", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-2136", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401368", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" }, { "db": "NVD", "id": "CVE-2021-39967" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei A vulnerability related to improper default permissions exists in smartphone products.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a sensitive information disclosure vulnerability in the Huawei HarmonyOS SIM dual card management component. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39967", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017614", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2136", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-14782", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401368", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39967", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" }, { "db": "NVD", "id": "CVE-2021-39967" } ] }, "id": "VAR-202111-1764", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401368" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:37.061000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176797" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39967" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" }, { "db": "NVD", "id": "CVE-2021-39967" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" }, { "db": "NVD", "id": "CVE-2021-39967" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401368" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39967" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2136" }, { "date": "2022-01-03T22:15:10", "db": "NVD", "id": "CVE-2021-39967" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401368" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39967" }, { "date": "2023-01-27T07:25:00", "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2136" }, { "date": "2022-01-13T16:23:38.167000", "db": "NVD", "id": "CVE-2021-39967" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2136" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Improper Default Permission Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017614" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2136" } ], "trust": 0.6 } }
var-202208-0784
Vulnerability from variot
The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0784", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" } ] }, "cve": "CVE-2022-37004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-37004", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37004", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-37004", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-37004", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202208-2398", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" }, { "db": "NVD", "id": "CVE-2022-37004" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "VULHUB", "id": "VHN-427495" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37004", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-014552", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2398", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427495", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427495" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" }, { "db": "NVD", "id": "CVE-2022-37004" } ] }, "id": "VAR-202208-0784", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427495" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:21:40.151000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=204368" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37004" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37004/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427495" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" }, { "db": "NVD", "id": "CVE-2022-37004" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427495" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" }, { "db": "NVD", "id": "CVE-2022-37004" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427495" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2398" }, { "date": "2022-08-10T20:16:04.263000", "db": "NVD", "id": "CVE-2022-37004" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427495" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2398" }, { "date": "2022-08-15T18:00:46.777000", "db": "NVD", "id": "CVE-2022-37004" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2398" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2398" } ], "trust": 0.6 } }
var-202207-0143
Vulnerability from variot
The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0143", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "NVD", "id": "CVE-2022-34736" } ] }, "cve": "CVE-2022-34736", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-34736", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-427077", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-34736", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34736", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-34736", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-34736", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202207-419", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427077", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-34736", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "CNNVD", "id": "CNNVD-202207-419" }, { "db": "NVD", "id": "CVE-2022-34736" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34736", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013204", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-419", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-61609", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427077", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34736", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "CNNVD", "id": "CNNVD-202207-419" }, { "db": "NVD", "id": "CVE-2022-34736" } ] }, "id": "VAR-202207-0143", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427077" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:49:43.009000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=200890" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "NVD", "id": "CVE-2022-34736" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34736" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34736/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/476.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "CNNVD", "id": "CNNVD-202207-419" }, { "db": "NVD", "id": "CVE-2022-34736" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "CNNVD", "id": "CNNVD-202207-419" }, { "db": "NVD", "id": "CVE-2022-34736" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427077" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34736" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-419" }, { "date": "2022-07-12T14:15:19.300000", "db": "NVD", "id": "CVE-2022-34736" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427077" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34736" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "date": "2022-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-419" }, { "date": "2022-07-19T12:00:18", "db": "NVD", "id": "CVE-2022-34736" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-419" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013204" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-419" } ], "trust": 0.6 } }
var-202211-0452
Vulnerability from variot
The DRM module has a vulnerability in verifying the secure memory attributes. Successful exploitation of this vulnerability may cause abnormal video playback. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0452", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "NVD", "id": "CVE-2021-46851" } ] }, "cve": "CVE-2021-46851", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-46851", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46851", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46851", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-46851", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202211-2138", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "CNNVD", "id": "CNNVD-202211-2138" }, { "db": "NVD", "id": "CVE-2021-46851" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DRM module has a vulnerability in verifying the secure memory attributes. Successful exploitation of this vulnerability may cause abnormal video playback. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-46851" }, { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "VULHUB", "id": "VHN-430159" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46851", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020635", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2138", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430159", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430159" }, { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "CNNVD", "id": "CNNVD-202211-2138" }, { "db": "NVD", "id": "CVE-2021-46851" } ] }, "id": "VAR-202211-0452", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430159" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:49:30.963000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213975" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "NVD", "id": "CVE-2021-46851" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46851" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46851/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430159" }, { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "CNNVD", "id": "CNNVD-202211-2138" }, { "db": "NVD", "id": "CVE-2021-46851" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430159" }, { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "CNNVD", "id": "CNNVD-202211-2138" }, { "db": "NVD", "id": "CVE-2021-46851" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-430159" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2138" }, { "date": "2022-11-09T21:15:12.877000", "db": "NVD", "id": "CVE-2021-46851" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-430159" }, { "date": "2023-11-02T08:06:00", "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2138" }, { "date": "2022-11-10T19:26:24.317000", "db": "NVD", "id": "CVE-2021-46851" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2138" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020635" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2138" } ], "trust": 0.6 } }
var-202201-1021
Vulnerability from variot
There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HarmonyOS Wearables is an electronic watch operating system from Huawei, a Chinese company. An attacker can use this vulnerability to cause system exceptions. There is a security vulnerability in Huawei HarmonyOS Wearables
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1021", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos wearables", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" } ] }, "cve": "CVE-2021-40009", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40009", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-08049", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401410", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40009", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40009", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40009", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-40009", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-08049", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-314", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401410", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "CNNVD", "id": "CNNVD-202201-314" }, { "db": "NVD", "id": "CVE-2021-40009" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HarmonyOS Wearables is an electronic watch operating system from Huawei, a Chinese company. An attacker can use this vulnerability to cause system exceptions. There is a security vulnerability in Huawei HarmonyOS Wearables", "sources": [ { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40009", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-002891", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-08049", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202201-314", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401410", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "CNNVD", "id": "CNNVD-202201-314" }, { "db": "NVD", "id": "CVE-2021-40009" } ] }, "id": "VAR-202201-1021", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" } ] }, "last_update_date": "2024-08-14T15:16:56.656000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Patch for Huawei HarmonyOS Wearables Out-of-bounds Write Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/316801" }, { "title": "Huawei HarmonyOS Wearables Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=178011" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40009" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202201-0000001239056313" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "CNNVD", "id": "CNNVD-202201-314" }, { "db": "NVD", "id": "CVE-2021-40009" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "CNNVD", "id": "CNNVD-202201-314" }, { "db": "NVD", "id": "CVE-2021-40009" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-30T00:00:00", "db": "CNVD", "id": "CNVD-2022-08049" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401410" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-314" }, { "date": "2022-01-10T14:10:21.310000", "db": "NVD", "id": "CVE-2021-40009" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-01T00:00:00", "db": "CNVD", "id": "CNVD-2022-08049" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401410" }, { "date": "2023-01-24T05:28:00", "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-314" }, { "date": "2022-01-13T15:32:45.070000", "db": "NVD", "id": "CVE-2021-40009" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-314" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002891" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-314" } ], "trust": 0.6 } }
var-202209-0172
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0172", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "NVD", "id": "CVE-2022-38994" } ] }, "cve": "CVE-2022-38994", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38994", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38994", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38994", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-38994", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-178", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "CNNVD", "id": "CNNVD-202209-178" }, { "db": "NVD", "id": "CVE-2022-38994" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38994" }, { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "VULHUB", "id": "VHN-428514" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38994", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016785", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-178", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428514", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428514" }, { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "CNNVD", "id": "CNNVD-202209-178" }, { "db": "NVD", "id": "CVE-2022-38994" } ] }, "id": "VAR-202209-0172", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428514" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:17:43.684000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208083" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "NVD", "id": "CVE-2022-38994" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38994" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38994/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428514" }, { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "CNNVD", "id": "CNNVD-202209-178" }, { "db": "NVD", "id": "CVE-2022-38994" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428514" }, { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "CNNVD", "id": "CNNVD-202209-178" }, { "db": "NVD", "id": "CVE-2022-38994" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428514" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-178" }, { "date": "2022-09-16T18:15:17.707000", "db": "NVD", "id": "CVE-2022-38994" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428514" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-178" }, { "date": "2022-09-17T03:11:09.253000", "db": "NVD", "id": "CVE-2022-38994" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-178" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016785" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-178" } ], "trust": 0.6 } }
var-202210-0286
Vulnerability from variot
The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0286", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "NVD", "id": "CVE-2022-41580" } ] }, "cve": "CVE-2022-41580", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-41580", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41580", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41580", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-41580", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202210-169", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "CNNVD", "id": "CNNVD-202210-169" }, { "db": "NVD", "id": "CVE-2022-41580" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-41580" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "VULHUB", "id": "VHN-437809" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41580", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018740", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-169", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437809", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437809" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "CNNVD", "id": "CNNVD-202210-169" }, { "db": "NVD", "id": "CVE-2022-41580" } ] }, "id": "VAR-202210-0286", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437809" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:01.241000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211151" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437809" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "NVD", "id": "CVE-2022-41580" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41580" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41580/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437809" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "CNNVD", "id": "CNNVD-202210-169" }, { "db": "NVD", "id": "CVE-2022-41580" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437809" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "CNNVD", "id": "CNNVD-202210-169" }, { "db": "NVD", "id": "CVE-2022-41580" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437809" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-169" }, { "date": "2022-10-14T16:15:21.433000", "db": "NVD", "id": "CVE-2022-41580" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437809" }, { "date": "2023-10-23T06:24:00", "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-169" }, { "date": "2022-10-18T14:49:52.020000", "db": "NVD", "id": "CVE-2022-41580" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-169" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018740" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-169" } ], "trust": 0.6 } }
var-202211-1051
Vulnerability from variot
The power module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause abnormal status of a module on the device
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-1051", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44554" } ] }, "cve": "CVE-2022-44554", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-44554", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44554", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2127", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2127" }, { "db": "NVD", "id": "CVE-2022-44554" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The power module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause abnormal status of a module on the device", "sources": [ { "db": "NVD", "id": "CVE-2022-44554" }, { "db": "VULHUB", "id": "VHN-441941" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44554", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2127", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441941", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441941" }, { "db": "CNNVD", "id": "CNNVD-202211-2127" }, { "db": "NVD", "id": "CVE-2022-44554" } ] }, "id": "VAR-202211-1051", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441941" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:27.373000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=214355" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44554" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44554/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441941" }, { "db": "CNNVD", "id": "CNNVD-202211-2127" }, { "db": "NVD", "id": "CVE-2022-44554" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441941" }, { "db": "CNNVD", "id": "CNNVD-202211-2127" }, { "db": "NVD", "id": "CVE-2022-44554" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441941" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2127" }, { "date": "2022-11-09T21:15:18.503000", "db": "NVD", "id": "CVE-2022-44554" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441941" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2127" }, { "date": "2022-11-14T19:13:19.993000", "db": "NVD", "id": "CVE-2022-44554" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2127" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2127" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2127" } ], "trust": 0.6 } }
var-202112-0254
Vulnerability from variot
There is a Weaknesses Introduced During Design. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0254", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "NVD", "id": "CVE-2021-37059" } ] }, "cve": "CVE-2021-37059", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37059", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398892", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37059", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37059", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37059", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37059", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2015", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398892", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398892" }, { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "CNNVD", "id": "CNNVD-202109-2015" }, { "db": "NVD", "id": "CVE-2021-37059" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Weaknesses Introduced During Design. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37059" }, { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "VULHUB", "id": "VHN-398892" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37059", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016047", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2015", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398892", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398892" }, { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "CNNVD", "id": "CNNVD-202109-2015" }, { "db": "NVD", "id": "CVE-2021-37059" } ] }, "id": "VAR-202112-0254", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398892" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:37:48.799000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173494" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "CNNVD", "id": "CNNVD-202109-2015" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "NVD", "id": "CVE-2021-37059" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37059" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398892" }, { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "CNNVD", "id": "CNNVD-202109-2015" }, { "db": "NVD", "id": "CVE-2021-37059" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398892" }, { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "CNNVD", "id": "CNNVD-202109-2015" }, { "db": "NVD", "id": "CVE-2021-37059" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398892" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2015" }, { "date": "2021-12-07T17:15:08.550000", "db": "NVD", "id": "CVE-2021-37059" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398892" }, { "date": "2022-12-05T07:39:00", "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "date": "2021-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2015" }, { "date": "2021-12-09T17:40:36.840000", "db": "NVD", "id": "CVE-2021-37059" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2015" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016047" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2015" } ], "trust": 0.6 } }
var-202201-1042
Vulnerability from variot
There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. Huawei HarmonyOS , EMUI , Magic UI contains a type confusion vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has a security vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1042", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" } ] }, "cve": "CVE-2021-40037", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40037", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-401438", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-40037", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40037", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40037", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-40037", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202201-279", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401438", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "CNNVD", "id": "CNNVD-202201-279" }, { "db": "NVD", "id": "CVE-2021-40037" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. Huawei HarmonyOS , EMUI , Magic UI contains a type confusion vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has a security vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "VULHUB", "id": "VHN-401438" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40037", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002909", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-279", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04994", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401438", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "CNNVD", "id": "CNNVD-202201-279" }, { "db": "NVD", "id": "CVE-2021-40037" } ] }, "id": "VAR-202201-1042", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401438" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:56.631000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177445" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-843", "trust": 1.1 }, { "problemtype": "Mistake of type (CWE-843) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40037" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "CNNVD", "id": "CNNVD-202201-279" }, { "db": "NVD", "id": "CVE-2021-40037" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "CNNVD", "id": "CNNVD-202201-279" }, { "db": "NVD", "id": "CVE-2021-40037" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401438" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-279" }, { "date": "2022-01-10T14:10:22.520000", "db": "NVD", "id": "CVE-2021-40037" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401438" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-279" }, { "date": "2022-01-13T15:33:36.160000", "db": "NVD", "id": "CVE-2021-40037" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-279" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product type mix-up vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002909" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-279" } ], "trust": 0.6 } }
var-202206-0377
Vulnerability from variot
The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI , HarmonyOS , Magic UI There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0377", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" } ] }, "cve": "CVE-2022-31762", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2022-31762", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-423595", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-31762", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31762", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-31762", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-31762", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202206-473", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423595", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31762", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "CNNVD", "id": "CNNVD-202206-473" }, { "db": "NVD", "id": "CVE-2022-31762" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI , HarmonyOS , Magic UI There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31762", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011277", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-473", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66177", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423595", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31762", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "CNNVD", "id": "CNNVD-202206-473" }, { "db": "NVD", "id": "CVE-2022-31762" } ] }, "id": "VAR-202206-0377", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423595" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:46.828000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=196700" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2022-31762 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31762" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31762/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-31762" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "CNNVD", "id": "CNNVD-202206-473" }, { "db": "NVD", "id": "CVE-2022-31762" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "CNNVD", "id": "CNNVD-202206-473" }, { "db": "NVD", "id": "CVE-2022-31762" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423595" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31762" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-473" }, { "date": "2022-06-13T15:15:10.423000", "db": "NVD", "id": "CVE-2022-31762" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-05T00:00:00", "db": "VULHUB", "id": "VHN-423595" }, { "date": "2022-10-05T00:00:00", "db": "VULMON", "id": "CVE-2022-31762" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "date": "2022-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-473" }, { "date": "2022-10-05T14:59:08.577000", "db": "NVD", "id": "CVE-2022-31762" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-473" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product input verification vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011277" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-473" } ], "trust": 0.6 } }
var-202111-0882
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0882", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "NVD", "id": "CVE-2021-37005" } ] }, "cve": "CVE-2021-37005", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37005", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398836", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37005", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37005", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37005", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37005", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1874", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398836", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398836" }, { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "CNNVD", "id": "CNNVD-202111-1874" }, { "db": "NVD", "id": "CVE-2021-37005" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37005" }, { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "VULHUB", "id": "VHN-398836" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37005", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015636", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1874", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398836", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398836" }, { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "CNNVD", "id": "CNNVD-202111-1874" }, { "db": "NVD", "id": "CVE-2021-37005" } ] }, "id": "VAR-202111-0882", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398836" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:51.381000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172173" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "CNNVD", "id": "CNNVD-202111-1874" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398836" }, { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "NVD", "id": "CVE-2021-37005" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37005" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398836" }, { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "CNNVD", "id": "CNNVD-202111-1874" }, { "db": "NVD", "id": "CVE-2021-37005" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398836" }, { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "CNNVD", "id": "CNNVD-202111-1874" }, { "db": "NVD", "id": "CVE-2021-37005" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398836" }, { "date": "2022-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1874" }, { "date": "2021-11-23T16:15:08.893000", "db": "NVD", "id": "CVE-2021-37005" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398836" }, { "date": "2022-11-28T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1874" }, { "date": "2021-11-29T16:04:50.927000", "db": "NVD", "id": "CVE-2021-37005" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1874" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015636" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1874" } ], "trust": 0.6 } }
var-202111-0948
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0948", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "NVD", "id": "CVE-2021-37026" } ] }, "cve": "CVE-2021-37026", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37026", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398859", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37026", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37026", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37026", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37026", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1892", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398859", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398859" }, { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "CNNVD", "id": "CNNVD-202111-1892" }, { "db": "NVD", "id": "CVE-2021-37026" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37026" }, { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "VULHUB", "id": "VHN-398859" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37026", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015561", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1892", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398859", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398859" }, { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "CNNVD", "id": "CNNVD-202111-1892" }, { "db": "NVD", "id": "CVE-2021-37026" } ] }, "id": "VAR-202111-0948", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398859" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:45.055000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172190" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "CNNVD", "id": "CNNVD-202111-1892" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398859" }, { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "NVD", "id": "CVE-2021-37026" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37026" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398859" }, { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "CNNVD", "id": "CNNVD-202111-1892" }, { "db": "NVD", "id": "CVE-2021-37026" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398859" }, { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "CNNVD", "id": "CNNVD-202111-1892" }, { "db": "NVD", "id": "CVE-2021-37026" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398859" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1892" }, { "date": "2021-11-23T16:15:09.627000", "db": "NVD", "id": "CVE-2021-37026" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398859" }, { "date": "2022-11-24T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1892" }, { "date": "2021-11-29T17:55:52.603000", "db": "NVD", "id": "CVE-2021-37026" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1892" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015561" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1892" } ], "trust": 0.6 } }
var-202209-0254
Vulnerability from variot
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0254", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" } ] }, "cve": "CVE-2022-39004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-39004", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-39004", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-39004", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-39004", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-199", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "CNNVD", "id": "CNNVD-202209-199" }, { "db": "NVD", "id": "CVE-2022-39004" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39004", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017590", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-199", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-64983", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428496", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39004", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "CNNVD", "id": "CNNVD-202209-199" }, { "db": "NVD", "id": "CVE-2022-39004" } ] }, "id": "VAR-202209-0254", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428496" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:03.407000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=208092" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39004" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39004/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "CNNVD", "id": "CNNVD-202209-199" }, { "db": "NVD", "id": "CVE-2022-39004" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "CNNVD", "id": "CNNVD-202209-199" }, { "db": "NVD", "id": "CVE-2022-39004" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428496" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39004" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-199" }, { "date": "2022-09-16T18:15:18.053000", "db": "NVD", "id": "CVE-2022-39004" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428496" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39004" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-199" }, { "date": "2022-09-21T12:43:01.093000", "db": "NVD", "id": "CVE-2022-39004" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-199" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of freeing memory after expiration in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017590" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-199" } ], "trust": 0.6 } }
var-202209-0452
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0452", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" } ] }, "cve": "CVE-2022-38991", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38991", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38991", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38991", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-38991", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-185", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "CNNVD", "id": "CNNVD-202209-185" }, { "db": "NVD", "id": "CVE-2022-38991" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "VULHUB", "id": "VHN-428507" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38991", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016788", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-185", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428507", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428507" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "CNNVD", "id": "CNNVD-202209-185" }, { "db": "NVD", "id": "CVE-2022-38991" } ] }, "id": "VAR-202209-0452", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428507" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:26.880000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208087" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38991" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38991/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428507" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "CNNVD", "id": "CNNVD-202209-185" }, { "db": "NVD", "id": "CVE-2022-38991" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428507" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "CNNVD", "id": "CNNVD-202209-185" }, { "db": "NVD", "id": "CVE-2022-38991" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428507" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-185" }, { "date": "2022-09-16T18:15:17.590000", "db": "NVD", "id": "CVE-2022-38991" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428507" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-185" }, { "date": "2022-09-17T03:46:16.633000", "db": "NVD", "id": "CVE-2022-38991" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-185" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-185" } ], "trust": 0.6 } }
var-202302-0433
Vulnerability from variot
The multi-screen collaboration module has a privilege escalation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0433", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "NVD", "id": "CVE-2022-48286" } ] }, "cve": "CVE-2022-48286", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-48286", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48286", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48286", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-48286", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202302-348", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "CNNVD", "id": "CNNVD-202302-348" }, { "db": "NVD", "id": "CVE-2022-48286" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The multi-screen collaboration module has a privilege escalation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "VULHUB", "id": "VHN-453366" }, { "db": "VULMON", "id": "CVE-2022-48286" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48286", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003370", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-348", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453366", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48286", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453366" }, { "db": "VULMON", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "CNNVD", "id": "CNNVD-202302-348" }, { "db": "NVD", "id": "CVE-2022-48286" } ] }, "id": "VAR-202302-0433", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453366" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:42:05.539000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225749" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2022-48286 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453366" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "NVD", "id": "CVE-2022-48286" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48286" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48286/" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48286" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453366" }, { "db": "VULMON", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "CNNVD", "id": "CNNVD-202302-348" }, { "db": "NVD", "id": "CVE-2022-48286" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453366" }, { "db": "VULMON", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "CNNVD", "id": "CNNVD-202302-348" }, { "db": "NVD", "id": "CVE-2022-48286" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453366" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48286" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-348" }, { "date": "2023-02-09T17:15:12.237000", "db": "NVD", "id": "CVE-2022-48286" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453366" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48286" }, { "date": "2023-09-07T01:16:00", "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-348" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-48286" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-348" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003370" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-348" } ], "trust": 0.6 } }
var-202110-1855
Vulnerability from variot
Password vault has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability could compromise confidentiality. HarmonyOS Exists in a vulnerability in externally controllable references to resources in another region.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1855", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "NVD", "id": "CVE-2021-39971" } ] }, "cve": "CVE-2021-39971", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-39971", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401372", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-39971", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39971", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39971", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39971", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2226", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401372", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401372" }, { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "CNNVD", "id": "CNNVD-202110-2226" }, { "db": "NVD", "id": "CVE-2021-39971" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Password vault has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability could compromise confidentiality. HarmonyOS Exists in a vulnerability in externally controllable references to resources in another region.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-39971" }, { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "VULHUB", "id": "VHN-401372" }, { "db": "VULMON", "id": "CVE-2021-39971" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39971", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017610", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2226", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401372", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39971", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401372" }, { "db": "VULMON", "id": "CVE-2021-39971" }, { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "CNNVD", "id": "CNNVD-202110-2226" }, { "db": "NVD", "id": "CVE-2021-39971" } ] }, "id": "VAR-202110-1855", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401372" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:23:13.111000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176774" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "CNNVD", "id": "CNNVD-202110-2226" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.0 }, { "problemtype": "Externally controllable reference to another region resource (CWE-610) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-610", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401372" }, { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "NVD", "id": "CVE-2021-39971" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39971" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401372" }, { "db": "VULMON", "id": "CVE-2021-39971" }, { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "CNNVD", "id": "CNNVD-202110-2226" }, { "db": "NVD", "id": "CVE-2021-39971" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401372" }, { "db": "VULMON", "id": "CVE-2021-39971" }, { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "CNNVD", "id": "CNNVD-202110-2226" }, { "db": "NVD", "id": "CVE-2021-39971" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401372" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39971" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2226" }, { "date": "2022-01-03T22:15:10.190000", "db": "NVD", "id": "CVE-2021-39971" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401372" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39971" }, { "date": "2023-01-27T07:07:00", "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2226" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-39971" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2226" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in externally controllable references to resources in another region of", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017610" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2226" } ], "trust": 0.6 } }
var-202112-0350
Vulnerability from variot
There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0350", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" } ] }, "cve": "CVE-2021-37050", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37050", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398883", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37050", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37050", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37050", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37050", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2020", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398883", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" }, { "db": "NVD", "id": "CVE-2021-37050" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "VULHUB", "id": "VHN-398883" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37050", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015858", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2020", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398883", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" }, { "db": "NVD", "id": "CVE-2021-37050" } ] }, "id": "VAR-202112-0350", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398883" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:44.184000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Missing\u00a0sensitive\u00a0data\u00a0encryption\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for encryption problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173788" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-311", "trust": 1.1 }, { "problemtype": "Lack of encryption of critical data (CWE-311) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37050" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" }, { "db": "NVD", "id": "CVE-2021-37050" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" }, { "db": "NVD", "id": "CVE-2021-37050" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398883" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2020" }, { "date": "2021-12-08T15:15:09.480000", "db": "NVD", "id": "CVE-2021-37050" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398883" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2020" }, { "date": "2021-12-09T17:58:47.893000", "db": "NVD", "id": "CVE-2021-37050" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2020" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of encryption of important data in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015858" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2020" } ], "trust": 0.6 } }
var-202108-2284
Vulnerability from variot
Some Huawei products have an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to kernel crash. HarmonyOS Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2284", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "NVD", "id": "CVE-2021-22441" } ] }, "cve": "CVE-2021-22441", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22441", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380876", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22441", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22441", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22441", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22441", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202108-2830", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380876", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380876" }, { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "CNNVD", "id": "CNNVD-202108-2830" }, { "db": "NVD", "id": "CVE-2021-22441" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some Huawei products have an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to kernel crash. HarmonyOS Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22441" }, { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "VULHUB", "id": "VHN-380876" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22441", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018625", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-2830", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380876", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380876" }, { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "CNNVD", "id": "CNNVD-202108-2830" }, { "db": "NVD", "id": "CVE-2021-22441" } ] }, "id": "VAR-202108-2284", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380876" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:22:10.522000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172038" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "CNNVD", "id": "CNNVD-202108-2830" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380876" }, { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "NVD", "id": "CVE-2021-22441" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22441" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22441/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380876" }, { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "CNNVD", "id": "CNNVD-202108-2830" }, { "db": "NVD", "id": "CVE-2021-22441" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380876" }, { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "CNNVD", "id": "CNNVD-202108-2830" }, { "db": "NVD", "id": "CVE-2021-22441" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380876" }, { "date": "2023-07-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2830" }, { "date": "2022-02-25T19:15:10.617000", "db": "NVD", "id": "CVE-2021-22441" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380876" }, { "date": "2023-07-04T02:07:00", "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2830" }, { "date": "2022-03-07T18:59:28.417000", "db": "NVD", "id": "CVE-2021-22441" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2830" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018625" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2830" } ], "trust": 0.6 } }
var-202112-0248
Vulnerability from variot
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0248", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "NVD", "id": "CVE-2021-37066" } ] }, "cve": "CVE-2021-37066", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37066", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398900", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37066", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37066", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37066", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37066", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2013", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398900", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398900" }, { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "CNNVD", "id": "CNNVD-202109-2013" }, { "db": "NVD", "id": "CVE-2021-37066" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37066" }, { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "VULHUB", "id": "VHN-398900" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37066", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015977", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2013", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398900", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398900" }, { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "CNNVD", "id": "CNNVD-202109-2013" }, { "db": "NVD", "id": "CVE-2021-37066" } ] }, "id": "VAR-202112-0248", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398900" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:25:07.006000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173492" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "CNNVD", "id": "CNNVD-202109-2013" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398900" }, { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "NVD", "id": "CVE-2021-37066" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37066" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398900" }, { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "CNNVD", "id": "CNNVD-202109-2013" }, { "db": "NVD", "id": "CVE-2021-37066" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398900" }, { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "CNNVD", "id": "CNNVD-202109-2013" }, { "db": "NVD", "id": "CVE-2021-37066" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398900" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2013" }, { "date": "2021-12-07T17:15:08.843000", "db": "NVD", "id": "CVE-2021-37066" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398900" }, { "date": "2022-12-05T02:55:00", "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2013" }, { "date": "2021-12-09T17:38:21.527000", "db": "NVD", "id": "CVE-2021-37066" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2013" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015977" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2013" } ], "trust": 0.6 } }
var-202106-1819
Vulnerability from variot
A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to bypass user restrictions. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws. Successful exploitation of this vulnerability could compromise service confidentiality, availability, and integrity
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1819", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22376" } ] }, "cve": "CVE-2021-22376", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2021-22376", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380811", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22376", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.5, "id": "CVE-2021-22376", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22376", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-1986", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380811", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22376", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380811" }, { "db": "VULMON", "id": "CVE-2021-22376" }, { "db": "CNNVD", "id": "CNNVD-202106-1986" }, { "db": "NVD", "id": "CVE-2021-22376" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to bypass user restrictions. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws. Successful exploitation of this vulnerability could compromise service confidentiality, availability, and integrity", "sources": [ { "db": "NVD", "id": "CVE-2021-22376" }, { "db": "VULHUB", "id": "VHN-380811" }, { "db": "VULMON", "id": "CVE-2021-22376" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22376", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1986", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380811", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22376", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380811" }, { "db": "VULMON", "id": "CVE-2021-22376" }, { "db": "CNNVD", "id": "CNNVD-202106-1986" }, { "db": "NVD", "id": "CVE-2021-22376" } ] }, "id": "VAR-202106-1819", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380811" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:17:10.458000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=156069" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1986" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380811" }, { "db": "NVD", "id": "CVE-2021-22376" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380811" }, { "db": "VULMON", "id": "CVE-2021-22376" }, { "db": "CNNVD", "id": "CNNVD-202106-1986" }, { "db": "NVD", "id": "CVE-2021-22376" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380811" }, { "db": "VULMON", "id": "CVE-2021-22376" }, { "db": "CNNVD", "id": "CNNVD-202106-1986" }, { "db": "NVD", "id": "CVE-2021-22376" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380811" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22376" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1986" }, { "date": "2021-06-30T14:15:08.690000", "db": "NVD", "id": "CVE-2021-22376" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-05T00:00:00", "db": "VULHUB", "id": "VHN-380811" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22376" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1986" }, { "date": "2021-11-05T17:31:05.297000", "db": "NVD", "id": "CVE-2021-22376" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1986" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1986" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1986" } ], "trust": 0.6 } }
var-202103-0512
Vulnerability from variot
A component of HarmonyOS 2.0 has a DoS vulnerability. Local attackers may exploit this vulnerability to mount a file system to the target device, causing DoS of the file system. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0512", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "NVD", "id": "CVE-2021-22296" } ] }, "cve": "CVE-2021-22296", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22296", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380731", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22296", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22296", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22296", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22296", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202103-215", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380731", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22296", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380731" }, { "db": "VULMON", "id": "CVE-2021-22296" }, { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "CNNVD", "id": "CNNVD-202103-215" }, { "db": "NVD", "id": "CVE-2021-22296" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of HarmonyOS 2.0 has a DoS vulnerability. Local attackers may exploit this vulnerability to mount a file system to the target device, causing DoS of the file system. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-22296" }, { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "VULHUB", "id": "VHN-380731" }, { "db": "VULMON", "id": "CVE-2021-22296" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22296", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2021-003926", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202103-215", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380731", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22296", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380731" }, { "db": "VULMON", "id": "CVE-2021-22296" }, { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "CNNVD", "id": "CNNVD-202103-215" }, { "db": "NVD", "id": "CVE-2021-22296" } ] }, "id": "VAR-202103-0512", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380731" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:54:08.375000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://device.harmonyos.com/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=143682" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "CNNVD", "id": "CNNVD-202103-215" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "NVD", "id": "CVE-2021-22296" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" }, { "trust": 1.8, "url": "https://www.tenable.com/cve/cve-2021-22296" }, { "trust": 1.7, "url": "https://device.harmonyos.com/cn/console/safetydetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pagesize=10\u0026pageindex=1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22296" }, { "trust": 0.8, "url": "https://gitee.com/openharmony/kernel_liteos_a/pulls/48/files" }, { "trust": 0.1, "url": "https://device.harmonyos.com/cn/console/safetydetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026amp;pagesize=10\u0026amp;pageindex=1" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380731" }, { "db": "VULMON", "id": "CVE-2021-22296" }, { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "CNNVD", "id": "CNNVD-202103-215" }, { "db": "NVD", "id": "CVE-2021-22296" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380731" }, { "db": "VULMON", "id": "CVE-2021-22296" }, { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "CNNVD", "id": "CNNVD-202103-215" }, { "db": "NVD", "id": "CVE-2021-22296" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-02T00:00:00", "db": "VULHUB", "id": "VHN-380731" }, { "date": "2021-03-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22296" }, { "date": "2021-11-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "date": "2021-03-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202103-215" }, { "date": "2021-03-02T19:15:13.207000", "db": "NVD", "id": "CVE-2021-22296" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-09T00:00:00", "db": "VULHUB", "id": "VHN-380731" }, { "date": "2021-03-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22296" }, { "date": "2021-11-10T06:36:00", "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "date": "2021-03-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202103-215" }, { "date": "2021-03-09T14:06:23.240000", "db": "NVD", "id": "CVE-2021-22296" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202103-215" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003926" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202103-215" } ], "trust": 0.6 } }
var-202112-0229
Vulnerability from variot
There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel restart. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0229", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "NVD", "id": "CVE-2021-37089" } ] }, "cve": "CVE-2021-37089", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37089", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398924", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37089", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37089", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37089", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37089", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2040", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398924", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398924" }, { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "CNNVD", "id": "CNNVD-202109-2040" }, { "db": "NVD", "id": "CVE-2021-37089" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel restart. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37089" }, { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "VULHUB", "id": "VHN-398924" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37089", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016023", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2040", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103540", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398924", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398924" }, { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "CNNVD", "id": "CNNVD-202109-2040" }, { "db": "NVD", "id": "CVE-2021-37089" } ] }, "id": "VAR-202112-0229", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398924" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:18:13.712000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173797" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "CNNVD", "id": "CNNVD-202109-2040" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-459", "trust": 1.1 }, { "problemtype": "incomplete cleanup (CWE-459) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398924" }, { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "NVD", "id": "CVE-2021-37089" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37089" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398924" }, { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "CNNVD", "id": "CNNVD-202109-2040" }, { "db": "NVD", "id": "CVE-2021-37089" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398924" }, { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "CNNVD", "id": "CNNVD-202109-2040" }, { "db": "NVD", "id": "CVE-2021-37089" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398924" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2040" }, { "date": "2021-12-07T17:15:09.697000", "db": "NVD", "id": "CVE-2021-37089" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398924" }, { "date": "2022-12-05T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "date": "2021-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2040" }, { "date": "2021-12-09T18:27:10.083000", "db": "NVD", "id": "CVE-2021-37089" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2040" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Incomplete Cleanup Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016023" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2040" } ], "trust": 0.6 } }
var-202301-0474
Vulnerability from variot
The system has a vulnerability that may cause dynamic hiding and restoring of app icons.Successful exploitation of this vulnerability may cause malicious hiding of app icons. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0474", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "NVD", "id": "CVE-2022-46761" } ] }, "cve": "CVE-2022-46761", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-46761", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46761", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46761", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-46761", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202301-439", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "CNNVD", "id": "CNNVD-202301-439" }, { "db": "NVD", "id": "CVE-2022-46761" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system has a vulnerability that may cause dynamic hiding and restoring of app icons.Successful exploitation of this vulnerability may cause malicious hiding of app icons. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-46761" }, { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "VULHUB", "id": "VHN-447441" }, { "db": "VULMON", "id": "CVE-2022-46761" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46761", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001770", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-439", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-447441", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-46761", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-447441" }, { "db": "VULMON", "id": "CVE-2022-46761" }, { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "CNNVD", "id": "CNNVD-202301-439" }, { "db": "NVD", "id": "CVE-2022-46761" } ] }, "id": "VAR-202301-0474", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-447441" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:26:55.321000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=221316" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "NVD", "id": "CVE-2022-46761" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46761" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46761/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-447441" }, { "db": "VULMON", "id": "CVE-2022-46761" }, { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "CNNVD", "id": "CNNVD-202301-439" }, { "db": "NVD", "id": "CVE-2022-46761" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-447441" }, { "db": "VULMON", "id": "CVE-2022-46761" }, { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "CNNVD", "id": "CNNVD-202301-439" }, { "db": "NVD", "id": "CVE-2022-46761" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-447441" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-46761" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-439" }, { "date": "2023-01-06T20:15:09.707000", "db": "NVD", "id": "CVE-2022-46761" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-447441" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-46761" }, { "date": "2023-05-09T01:55:00", "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-439" }, { "date": "2023-01-12T17:09:45.867000", "db": "NVD", "id": "CVE-2022-46761" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-439" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-439" } ], "trust": 0.6 } }
var-202209-0256
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0256", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "NVD", "id": "CVE-2022-38996" } ] }, "cve": "CVE-2022-38996", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-38996", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38996", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38996", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-38996", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-179", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "CNNVD", "id": "CNNVD-202209-179" }, { "db": "NVD", "id": "CVE-2022-38996" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38996" }, { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "VULHUB", "id": "VHN-428513" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38996", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016783", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-179", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428513", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428513" }, { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "CNNVD", "id": "CNNVD-202209-179" }, { "db": "NVD", "id": "CVE-2022-38996" } ] }, "id": "VAR-202209-0256", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428513" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:17:43.639000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208084" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "NVD", "id": "CVE-2022-38996" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38996" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38996/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428513" }, { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "CNNVD", "id": "CNNVD-202209-179" }, { "db": "NVD", "id": "CVE-2022-38996" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428513" }, { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "CNNVD", "id": "CNNVD-202209-179" }, { "db": "NVD", "id": "CVE-2022-38996" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428513" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-179" }, { "date": "2022-09-16T18:15:17.780000", "db": "NVD", "id": "CVE-2022-38996" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428513" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-179" }, { "date": "2022-09-17T03:46:47.113000", "db": "NVD", "id": "CVE-2022-38996" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-179" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016783" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-179" } ], "trust": 0.6 } }
var-202110-1450
Vulnerability from variot
A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause kernel out-of-bounds read. HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1450", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "NVD", "id": "CVE-2021-22469" } ] }, "cve": "CVE-2021-22469", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-22469", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380904", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22469", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22469", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22469", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22469", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2062", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380904", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380904" }, { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "CNNVD", "id": "CNNVD-202110-2062" }, { "db": "NVD", "id": "CVE-2021-22469" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause kernel out-of-bounds read. HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22469" }, { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "VULHUB", "id": "VHN-380904" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22469", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014252", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2062", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380904", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380904" }, { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "CNNVD", "id": "CNNVD-202110-2062" }, { "db": "NVD", "id": "CVE-2021-22469" } ] }, "id": "VAR-202110-1450", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380904" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:50:05.461000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171537" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "CNNVD", "id": "CNNVD-202110-2062" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380904" }, { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "NVD", "id": "CVE-2021-22469" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22469" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380904" }, { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "CNNVD", "id": "CNNVD-202110-2062" }, { "db": "NVD", "id": "CVE-2021-22469" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380904" }, { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "CNNVD", "id": "CNNVD-202110-2062" }, { "db": "NVD", "id": "CVE-2021-22469" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380904" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2062" }, { "date": "2021-10-28T13:15:09.620000", "db": "NVD", "id": "CVE-2021-22469" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380904" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2062" }, { "date": "2021-11-01T19:34:33.347000", "db": "NVD", "id": "CVE-2021-22469" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2062" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014252" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2062" } ], "trust": 0.6 } }
var-202204-0754
Vulnerability from variot
The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles. An attacker could exploit this vulnerability to cause unauthorized access
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0754", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" } ] }, "cve": "CVE-2022-22256", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-22256", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-409785", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-22256", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-22256", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-22256", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-22256", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202204-2017", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409785", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22256", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" }, { "db": "NVD", "id": "CVE-2022-22256" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles. An attacker could exploit this vulnerability to cause unauthorized access", "sources": [ { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22256", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-008143", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2017", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44625", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409785", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22256", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" }, { "db": "NVD", "id": "CVE-2022-22256" } ] }, "id": "VAR-202204-0754", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409785" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:01:04.862000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=190069" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22256" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22256/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" }, { "db": "NVD", "id": "CVE-2022-22256" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" }, { "db": "NVD", "id": "CVE-2022-22256" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409785" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22256" }, { "date": "2023-07-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2017" }, { "date": "2022-04-11T20:15:19.657000", "db": "NVD", "id": "CVE-2022-22256" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-19T00:00:00", "db": "VULHUB", "id": "VHN-409785" }, { "date": "2022-04-19T00:00:00", "db": "VULMON", "id": "CVE-2022-22256" }, { "date": "2023-07-24T08:23:00", "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "date": "2022-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2017" }, { "date": "2022-04-19T14:49:07.153000", "db": "NVD", "id": "CVE-2022-22256" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2017" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008143" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2017" } ], "trust": 0.6 } }
var-202110-1859
Vulnerability from variot
HwPCAssistant has a Improper Input Validation vulnerability.Successful exploitation of this vulnerability may create any file with the system app permission. HarmonyOS Exists in a past traversal vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1859", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "NVD", "id": "CVE-2021-39970" } ] }, "cve": "CVE-2021-39970", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-39970", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401371", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-39970", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39970", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39970", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39970", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2222", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401371", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401371" }, { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "CNNVD", "id": "CNNVD-202110-2222" }, { "db": "NVD", "id": "CVE-2021-39970" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HwPCAssistant has a Improper Input Validation vulnerability.Successful exploitation of this vulnerability may create any file with the system app permission. HarmonyOS Exists in a past traversal vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-39970" }, { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "VULHUB", "id": "VHN-401371" }, { "db": "VULMON", "id": "CVE-2021-39970" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39970", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017611", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2222", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401371", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39970", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401371" }, { "db": "VULMON", "id": "CVE-2021-39970" }, { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "CNNVD", "id": "CNNVD-202110-2222" }, { "db": "NVD", "id": "CVE-2021-39970" } ] }, "id": "VAR-202110-1859", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401371" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:37:50.820000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176770" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "CNNVD", "id": "CNNVD-202110-2222" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401371" }, { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "NVD", "id": "CVE-2021-39970" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39970" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401371" }, { "db": "VULMON", "id": "CVE-2021-39970" }, { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "CNNVD", "id": "CNNVD-202110-2222" }, { "db": "NVD", "id": "CVE-2021-39970" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401371" }, { "db": "VULMON", "id": "CVE-2021-39970" }, { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "CNNVD", "id": "CNNVD-202110-2222" }, { "db": "NVD", "id": "CVE-2021-39970" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401371" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39970" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2222" }, { "date": "2022-01-03T22:15:10.140000", "db": "NVD", "id": "CVE-2021-39970" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401371" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39970" }, { "date": "2023-01-27T07:10:00", "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2222" }, { "date": "2022-01-13T15:46:21.260000", "db": "NVD", "id": "CVE-2021-39970" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2222" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017611" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2222" } ], "trust": 0.6 } }
var-202209-0201
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0201", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" } ] }, "cve": "CVE-2022-38990", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-38990", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38990", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38990", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-38990", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-206", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "CNNVD", "id": "CNNVD-202209-206" }, { "db": "NVD", "id": "CVE-2022-38990" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "VULHUB", "id": "VHN-428491" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38990", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016789", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-206", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428491", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428491" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "CNNVD", "id": "CNNVD-202209-206" }, { "db": "NVD", "id": "CVE-2022-38990" } ] }, "id": "VAR-202209-0201", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428491" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:00:47.274000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208096" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38990" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38990/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428491" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "CNNVD", "id": "CNNVD-202209-206" }, { "db": "NVD", "id": "CVE-2022-38990" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428491" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "CNNVD", "id": "CNNVD-202209-206" }, { "db": "NVD", "id": "CVE-2022-38990" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428491" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-206" }, { "date": "2022-09-16T18:15:17.553000", "db": "NVD", "id": "CVE-2022-38990" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428491" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-206" }, { "date": "2022-09-17T03:45:28.350000", "db": "NVD", "id": "CVE-2022-38990" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-206" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-206" } ], "trust": 0.6 } }
var-202112-0355
Vulnerability from variot
There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0355", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" } ] }, "cve": "CVE-2021-37037", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37037", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398870", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37037", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37037", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37037", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37037", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2049", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398870", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" }, { "db": "NVD", "id": "CVE-2021-37037" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "VULHUB", "id": "VHN-398870" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37037", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015889", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2049", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398870", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" }, { "db": "NVD", "id": "CVE-2021-37037" } ] }, "id": "VAR-202112-0355", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398870" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:29.628000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Invalid\u00a0address\u00a0access\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173802" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37037" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" }, { "db": "NVD", "id": "CVE-2021-37037" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" }, { "db": "NVD", "id": "CVE-2021-37037" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398870" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2049" }, { "date": "2021-12-08T15:15:09.147000", "db": "NVD", "id": "CVE-2021-37037" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398870" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2049" }, { "date": "2021-12-09T17:51:40.283000", "db": "NVD", "id": "CVE-2021-37037" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2049" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2049" } ], "trust": 0.6 } }
var-202211-0397
Vulnerability from variot
The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0397", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44559" } ] }, "cve": "CVE-2022-44559", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-44559", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44559", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202211-2124", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2124" }, { "db": "NVD", "id": "CVE-2022-44559" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation", "sources": [ { "db": "NVD", "id": "CVE-2022-44559" }, { "db": "VULHUB", "id": "VHN-441949" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44559", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2124", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441949", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441949" }, { "db": "CNNVD", "id": "CNNVD-202211-2124" }, { "db": "NVD", "id": "CVE-2022-44559" } ] }, "id": "VAR-202211-0397", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441949" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:26:59.326000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=214354" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441949" }, { "db": "NVD", "id": "CVE-2022-44559" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44559" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44559/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441949" }, { "db": "CNNVD", "id": "CNNVD-202211-2124" }, { "db": "NVD", "id": "CVE-2022-44559" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441949" }, { "db": "CNNVD", "id": "CNNVD-202211-2124" }, { "db": "NVD", "id": "CVE-2022-44559" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441949" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2124" }, { "date": "2022-11-09T21:15:18.727000", "db": "NVD", "id": "CVE-2022-44559" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441949" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2124" }, { "date": "2022-11-14T19:09:05.380000", "db": "NVD", "id": "CVE-2022-44559" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2124" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Code problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2124" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2124" } ], "trust": 0.6 } }
var-202212-0385
Vulnerability from variot
The Wi-Fi module has a vulnerability in permission verification. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0385", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "NVD", "id": "CVE-2022-46321" } ] }, "cve": "CVE-2022-46321", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-46321", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46321", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46321", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-46321", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202212-2481", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "CNNVD", "id": "CNNVD-202212-2481" }, { "db": "NVD", "id": "CVE-2022-46321" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Wi-Fi module has a vulnerability in permission verification. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-46321" }, { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "VULHUB", "id": "VHN-444291" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46321", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024015", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2481", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444291", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444291" }, { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "CNNVD", "id": "CNNVD-202212-2481" }, { "db": "NVD", "id": "CVE-2022-46321" } ] }, "id": "VAR-202212-0385", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444291" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:03.179000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218944" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "NVD", "id": "CVE-2022-46321" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46321" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46321/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444291" }, { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "CNNVD", "id": "CNNVD-202212-2481" }, { "db": "NVD", "id": "CVE-2022-46321" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444291" }, { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "CNNVD", "id": "CNNVD-202212-2481" }, { "db": "NVD", "id": "CVE-2022-46321" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444291" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2481" }, { "date": "2022-12-20T21:15:11.690000", "db": "NVD", "id": "CVE-2022-46321" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444291" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2481" }, { "date": "2022-12-24T04:16:32.950000", "db": "NVD", "id": "CVE-2022-46321" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2481" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024015" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2481" } ], "trust": 0.6 } }
var-202112-0251
Vulnerability from variot
There is a Cryptographic Issues vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to read and delete images of Harmony devices. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0251", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "NVD", "id": "CVE-2021-37063" } ] }, "cve": "CVE-2021-37063", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37063", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398897", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37063", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37063", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37063", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37063", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2059", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398897", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398897" }, { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "CNNVD", "id": "CNNVD-202109-2059" }, { "db": "NVD", "id": "CVE-2021-37063" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Cryptographic Issues vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to read and delete images of Harmony devices. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37063" }, { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "VULHUB", "id": "VHN-398897" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37063", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016037", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2059", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398897", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398897" }, { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "CNNVD", "id": "CNNVD-202109-2059" }, { "db": "NVD", "id": "CVE-2021-37063" } ] }, "id": "VAR-202112-0251", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398897" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:55:44.455000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173527" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "CNNVD", "id": "CNNVD-202109-2059" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "NVD", "id": "CVE-2021-37063" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37063" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398897" }, { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "CNNVD", "id": "CNNVD-202109-2059" }, { "db": "NVD", "id": "CVE-2021-37063" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398897" }, { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "CNNVD", "id": "CNNVD-202109-2059" }, { "db": "NVD", "id": "CVE-2021-37063" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398897" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2059" }, { "date": "2021-12-07T17:15:08.717000", "db": "NVD", "id": "CVE-2021-37063" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398897" }, { "date": "2022-12-05T07:21:00", "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2059" }, { "date": "2021-12-09T17:39:50.060000", "db": "NVD", "id": "CVE-2021-37063" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2059" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016037" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2059" } ], "trust": 0.6 } }
var-202112-0237
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete arbitrary file by system_app permission. Huawei Smartphones contain a vulnerability related to input validation.Information is tampered with and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0237", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "NVD", "id": "CVE-2021-37079" } ] }, "cve": "CVE-2021-37079", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37079", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398913", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37079", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37079", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37079", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37079", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2008", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398913", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398913" }, { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "CNNVD", "id": "CNNVD-202109-2008" }, { "db": "NVD", "id": "CVE-2021-37079" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete arbitrary file by system_app permission. Huawei Smartphones contain a vulnerability related to input validation.Information is tampered with and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37079" }, { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "VULHUB", "id": "VHN-398913" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37079", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015951", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2008", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398913", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398913" }, { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "CNNVD", "id": "CNNVD-202109-2008" }, { "db": "NVD", "id": "CVE-2021-37079" } ] }, "id": "VAR-202112-0237", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398913" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:50:03.515000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173487" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "CNNVD", "id": "CNNVD-202109-2008" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398913" }, { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "NVD", "id": "CVE-2021-37079" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37079" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398913" }, { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "CNNVD", "id": "CNNVD-202109-2008" }, { "db": "NVD", "id": "CVE-2021-37079" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398913" }, { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "CNNVD", "id": "CNNVD-202109-2008" }, { "db": "NVD", "id": "CVE-2021-37079" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398913" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2008" }, { "date": "2021-12-07T17:15:09.270000", "db": "NVD", "id": "CVE-2021-37079" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398913" }, { "date": "2022-12-05T02:08:00", "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2008" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37079" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2008" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015951" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2008" } ], "trust": 0.6 } }
var-202111-0870
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0870", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "NVD", "id": "CVE-2021-37025" } ] }, "cve": "CVE-2021-37025", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37025", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398858", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37025", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37025", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37025", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37025", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1891", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398858", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398858" }, { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "CNNVD", "id": "CNNVD-202111-1891" }, { "db": "NVD", "id": "CVE-2021-37025" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37025" }, { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "VULHUB", "id": "VHN-398858" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37025", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015563", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1891", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398858", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398858" }, { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "CNNVD", "id": "CNNVD-202111-1891" }, { "db": "NVD", "id": "CVE-2021-37025" } ] }, "id": "VAR-202111-0870", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398858" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:37:49.606000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172189" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "CNNVD", "id": "CNNVD-202111-1891" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398858" }, { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "NVD", "id": "CVE-2021-37025" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37025" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398858" }, { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "CNNVD", "id": "CNNVD-202111-1891" }, { "db": "NVD", "id": "CVE-2021-37025" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398858" }, { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "CNNVD", "id": "CNNVD-202111-1891" }, { "db": "NVD", "id": "CVE-2021-37025" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398858" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1891" }, { "date": "2021-11-23T16:15:09.583000", "db": "NVD", "id": "CVE-2021-37025" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398858" }, { "date": "2022-11-24T07:01:00", "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1891" }, { "date": "2021-11-29T18:00:16.503000", "db": "NVD", "id": "CVE-2021-37025" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1891" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015563" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1891" } ], "trust": 0.6 } }
var-202210-0253
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0253", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "NVD", "id": "CVE-2022-41598" } ] }, "cve": "CVE-2022-41598", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "id": "CVE-2022-41598", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41598", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41598", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2022-41598", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202210-153", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "CNNVD", "id": "CNNVD-202210-153" }, { "db": "NVD", "id": "CVE-2022-41598" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41598" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "VULHUB", "id": "VHN-437840" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41598", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018789", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-153", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437840", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437840" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "CNNVD", "id": "CNNVD-202210-153" }, { "db": "NVD", "id": "CVE-2022-41598" } ] }, "id": "VAR-202210-0253", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437840" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:21:37.261000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210787" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437840" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "NVD", "id": "CVE-2022-41598" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41598" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41598/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437840" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "CNNVD", "id": "CNNVD-202210-153" }, { "db": "NVD", "id": "CVE-2022-41598" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437840" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "CNNVD", "id": "CNNVD-202210-153" }, { "db": "NVD", "id": "CVE-2022-41598" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437840" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-153" }, { "date": "2022-10-14T16:15:28.530000", "db": "NVD", "id": "CVE-2022-41598" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437840" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-153" }, { "date": "2022-10-15T01:56:09.340000", "db": "NVD", "id": "CVE-2022-41598" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-153" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018789" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-153" } ], "trust": 0.6 } }
var-202302-0317
Vulnerability from variot
The SystemUI has a vulnerability in permission management. Successful exploitation of this vulnerability may cause users to receive broadcasts from malicious apps, conveying false alarm information about external storage devices. EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0317", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "NVD", "id": "CVE-2022-48296" } ] }, "cve": "CVE-2022-48296", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-48296", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-48296", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48296", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-48296", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202302-339", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "CNNVD", "id": "CNNVD-202302-339" }, { "db": "NVD", "id": "CVE-2022-48296" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SystemUI has a vulnerability in permission management. Successful exploitation of this vulnerability may cause users to receive broadcasts from malicious apps, conveying false alarm information about external storage devices. EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-48296" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "VULHUB", "id": "VHN-453376" }, { "db": "VULMON", "id": "CVE-2022-48296" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48296", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003614", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-339", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453376", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48296", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453376" }, { "db": "VULMON", "id": "CVE-2022-48296" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "CNNVD", "id": "CNNVD-202302-339" }, { "db": "NVD", "id": "CVE-2022-48296" } ] }, "id": "VAR-202302-0317", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453376" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:21:07.617000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225927" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453376" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "NVD", "id": "CVE-2022-48296" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48296" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48296/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453376" }, { "db": "VULMON", "id": "CVE-2022-48296" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "CNNVD", "id": "CNNVD-202302-339" }, { "db": "NVD", "id": "CVE-2022-48296" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453376" }, { "db": "VULMON", "id": "CVE-2022-48296" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "CNNVD", "id": "CNNVD-202302-339" }, { "db": "NVD", "id": "CVE-2022-48296" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453376" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48296" }, { "date": "2023-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-339" }, { "date": "2023-02-09T17:15:14.337000", "db": "NVD", "id": "CVE-2022-48296" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-17T00:00:00", "db": "VULHUB", "id": "VHN-453376" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48296" }, { "date": "2023-09-14T07:27:00", "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "date": "2023-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-339" }, { "date": "2023-02-17T13:20:07.597000", "db": "NVD", "id": "CVE-2022-48296" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-339" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Permission Preservation Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003614" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-339" } ], "trust": 0.6 } }
var-202211-0327
Vulnerability from variot
The HiView module has a vulnerability of not filtering third-party apps out when the HiView module traverses to invoke the system provider. Successful exploitation of this vulnerability may cause third-party apps to start periodically
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0327", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44553" } ] }, "cve": "CVE-2022-44553", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-44553", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44553", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202211-2128", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2128" }, { "db": "NVD", "id": "CVE-2022-44553" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiView module has a vulnerability of not filtering third-party apps out when the HiView module traverses to invoke the system provider. Successful exploitation of this vulnerability may cause third-party apps to start periodically", "sources": [ { "db": "NVD", "id": "CVE-2022-44553" }, { "db": "VULHUB", "id": "VHN-441938" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44553", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2128", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441938", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441938" }, { "db": "CNNVD", "id": "CNNVD-202211-2128" }, { "db": "NVD", "id": "CVE-2022-44553" } ] }, "id": "VAR-202211-0327", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441938" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:17:39.057000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213632" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44553" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44553/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441938" }, { "db": "CNNVD", "id": "CNNVD-202211-2128" }, { "db": "NVD", "id": "CVE-2022-44553" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441938" }, { "db": "CNNVD", "id": "CNNVD-202211-2128" }, { "db": "NVD", "id": "CVE-2022-44553" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441938" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2128" }, { "date": "2022-11-09T21:15:18.447000", "db": "NVD", "id": "CVE-2022-44553" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441938" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2128" }, { "date": "2022-11-14T19:13:52.980000", "db": "NVD", "id": "CVE-2022-44553" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2128" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2128" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2128" } ], "trust": 0.6 } }
var-202301-0614
Vulnerability from variot
The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0614", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "NVD", "id": "CVE-2021-46868" } ] }, "cve": "CVE-2021-46868", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-46868", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46868", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46868", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-46868", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202301-438", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "CNNVD", "id": "CNNVD-202301-438" }, { "db": "NVD", "id": "CVE-2021-46868" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-46868" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "VULHUB", "id": "VHN-449873" }, { "db": "VULMON", "id": "CVE-2021-46868" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46868", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001771", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-438", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449873", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46868", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449873" }, { "db": "VULMON", "id": "CVE-2021-46868" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "CNNVD", "id": "CNNVD-202301-438" }, { "db": "NVD", "id": "CVE-2021-46868" } ] }, "id": "VAR-202301-0614", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449873" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:30:47.838000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=221315" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449873" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "NVD", "id": "CVE-2021-46868" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46868" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46868/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449873" }, { "db": "VULMON", "id": "CVE-2021-46868" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "CNNVD", "id": "CNNVD-202301-438" }, { "db": "NVD", "id": "CVE-2021-46868" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449873" }, { "db": "VULMON", "id": "CVE-2021-46868" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "CNNVD", "id": "CNNVD-202301-438" }, { "db": "NVD", "id": "CVE-2021-46868" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449873" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2021-46868" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-438" }, { "date": "2023-01-06T20:15:09.637000", "db": "NVD", "id": "CVE-2021-46868" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-449873" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2021-46868" }, { "date": "2023-05-09T01:58:00", "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-438" }, { "date": "2023-01-12T14:31:11.530000", "db": "NVD", "id": "CVE-2021-46868" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-438" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001771" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-438" } ], "trust": 0.6 } }
var-202110-1848
Vulnerability from variot
There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Some Huawei smart screens in Huawei HarmonyOS Vision have security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1848", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" } ] }, "cve": "CVE-2021-37117", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37117", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398953", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37117", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37117", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37117", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37117", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2233", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398953", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" }, { "db": "NVD", "id": "CVE-2021-37117" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Some Huawei smart screens in Huawei HarmonyOS Vision have security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37117", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017311", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2233", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-04710", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398953", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37117", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" }, { "db": "NVD", "id": "CVE-2021-37117" } ] }, "id": "VAR-202110-1848", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398953" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:55:46.324000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Service\u00a0logic\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176781" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37117" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" }, { "db": "NVD", "id": "CVE-2021-37117" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" }, { "db": "NVD", "id": "CVE-2021-37117" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398953" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37117" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2233" }, { "date": "2022-01-03T22:15:09.347000", "db": "NVD", "id": "CVE-2021-37117" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398953" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37117" }, { "date": "2023-01-13T06:27:00", "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2233" }, { "date": "2022-01-11T19:46:26.163000", "db": "NVD", "id": "CVE-2021-37117" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2233" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2233" } ], "trust": 0.6 } }
var-202211-0369
Vulnerability from variot
The iaware module has a vulnerability in thread security. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0369", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44551" } ] }, "cve": "CVE-2022-44551", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-44551", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44551", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202211-2135", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2135" }, { "db": "NVD", "id": "CVE-2022-44551" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The iaware module has a vulnerability in thread security. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability", "sources": [ { "db": "NVD", "id": "CVE-2022-44551" }, { "db": "VULHUB", "id": "VHN-441934" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44551", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2135", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441934", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441934" }, { "db": "CNNVD", "id": "CNNVD-202211-2135" }, { "db": "NVD", "id": "CVE-2022-44551" } ] }, "id": "VAR-202211-0369", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441934" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:17:39.017000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=214357" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44551" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44551/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441934" }, { "db": "CNNVD", "id": "CNNVD-202211-2135" }, { "db": "NVD", "id": "CVE-2022-44551" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441934" }, { "db": "CNNVD", "id": "CNNVD-202211-2135" }, { "db": "NVD", "id": "CVE-2022-44551" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441934" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2135" }, { "date": "2022-11-09T21:15:18.293000", "db": "NVD", "id": "CVE-2022-44551" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441934" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2135" }, { "date": "2022-11-14T19:15:45.333000", "db": "NVD", "id": "CVE-2022-44551" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2135" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2135" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2135" } ], "trust": 0.6 } }
var-202301-0558
Vulnerability from variot
The Bluetooth AVRCP module has a vulnerability that can lead to DoS attacks.Successful exploitation of this vulnerability may cause the Bluetooth process to restart. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0558", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "NVD", "id": "CVE-2022-47974" } ] }, "cve": "CVE-2022-47974", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2022-47974", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-47974", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-47974", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-47974", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202301-435", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "CNNVD", "id": "CNNVD-202301-435" }, { "db": "NVD", "id": "CVE-2022-47974" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Bluetooth AVRCP module has a vulnerability that can lead to DoS attacks.Successful exploitation of this vulnerability may cause the Bluetooth process to restart. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-47974" }, { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "VULHUB", "id": "VHN-449902" }, { "db": "VULMON", "id": "CVE-2022-47974" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-47974", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001768", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-435", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449902", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-47974", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449902" }, { "db": "VULMON", "id": "CVE-2022-47974" }, { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "CNNVD", "id": "CNNVD-202301-435" }, { "db": "NVD", "id": "CVE-2022-47974" } ] }, "id": "VAR-202301-0558", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449902" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:26:55.219000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=221312" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "NVD", "id": "CVE-2022-47974" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-47974" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-47974/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449902" }, { "db": "VULMON", "id": "CVE-2022-47974" }, { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "CNNVD", "id": "CNNVD-202301-435" }, { "db": "NVD", "id": "CVE-2022-47974" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449902" }, { "db": "VULMON", "id": "CVE-2022-47974" }, { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "CNNVD", "id": "CNNVD-202301-435" }, { "db": "NVD", "id": "CVE-2022-47974" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449902" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-47974" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-435" }, { "date": "2023-01-06T20:15:09.830000", "db": "NVD", "id": "CVE-2022-47974" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-449902" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-47974" }, { "date": "2023-05-09T01:38:00", "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-435" }, { "date": "2023-01-12T16:17:06.877000", "db": "NVD", "id": "CVE-2022-47974" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-435" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-435" } ], "trust": 0.6 } }
var-202110-1433
Vulnerability from variot
A component of the HarmonyOS has a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. Local attackers may exploit this vulnerability to cause arbitrary code execution. HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1433", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "NVD", "id": "CVE-2021-22458" } ] }, "cve": "CVE-2021-22458", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-22458", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380893", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22458", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22458", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22458", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22458", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2049", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380893", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22458", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380893" }, { "db": "VULMON", "id": "CVE-2021-22458" }, { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "CNNVD", "id": "CNNVD-202110-2049" }, { "db": "NVD", "id": "CVE-2021-22458" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. Local attackers may exploit this vulnerability to cause arbitrary code execution. HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22458" }, { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "VULHUB", "id": "VHN-380893" }, { "db": "VULMON", "id": "CVE-2021-22458" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22458", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014464", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2049", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380893", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22458", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380893" }, { "db": "VULMON", "id": "CVE-2021-22458" }, { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "CNNVD", "id": "CNNVD-202110-2049" }, { "db": "NVD", "id": "CVE-2021-22458" } ] }, "id": "VAR-202110-1433", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380893" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:23:14.229000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=168390" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "CNNVD", "id": "CNNVD-202110-2049" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380893" }, { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "NVD", "id": "CVE-2021-22458" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22458" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380893" }, { "db": "VULMON", "id": "CVE-2021-22458" }, { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "CNNVD", "id": "CNNVD-202110-2049" }, { "db": "NVD", "id": "CVE-2021-22458" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380893" }, { "db": "VULMON", "id": "CVE-2021-22458" }, { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "CNNVD", "id": "CNNVD-202110-2049" }, { "db": "NVD", "id": "CVE-2021-22458" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380893" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22458" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2049" }, { "date": "2021-10-28T13:15:09.147000", "db": "NVD", "id": "CVE-2021-22458" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380893" }, { "date": "2021-11-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22458" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2049" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22458" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2049" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014464" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2049" } ], "trust": 0.6 } }
var-202201-1716
Vulnerability from variot
There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. A resource management error vulnerability exists in Huawei HarmonyOS due to repeated calls to freed pointers by the product's camera component
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1716", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" } ] }, "cve": "CVE-2021-40039", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40039", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401440", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40039", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40039", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40039", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40039", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202201-294", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401440", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "CNNVD", "id": "CNNVD-202201-294" }, { "db": "NVD", "id": "CVE-2021-40039" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. A resource management error vulnerability exists in Huawei HarmonyOS due to repeated calls to freed pointers by the product\u0027s camera component", "sources": [ { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "VULHUB", "id": "VHN-401440" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40039", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002911", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-294", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04996", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401440", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "CNNVD", "id": "CNNVD-202201-294" }, { "db": "NVD", "id": "CVE-2021-40039" } ] }, "id": "VAR-202201-1716", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401440" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:52.557000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177450" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40039" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "CNNVD", "id": "CNNVD-202201-294" }, { "db": "NVD", "id": "CVE-2021-40039" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "CNNVD", "id": "CNNVD-202201-294" }, { "db": "NVD", "id": "CVE-2021-40039" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401440" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-294" }, { "date": "2022-01-10T14:10:22.937000", "db": "NVD", "id": "CVE-2021-40039" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401440" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-294" }, { "date": "2022-01-13T15:37:04.397000", "db": "NVD", "id": "CVE-2021-40039" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-294" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 In the product \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002911" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-294" } ], "trust": 0.6 } }
var-202210-0249
Vulnerability from variot
The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0249", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41584" } ] }, "cve": "CVE-2022-41584", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-41584", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41584", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-181", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-181" }, { "db": "NVD", "id": "CVE-2022-41584" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting", "sources": [ { "db": "NVD", "id": "CVE-2022-41584" }, { "db": "VULHUB", "id": "VHN-437815" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41584", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-181", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437815", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437815" }, { "db": "CNNVD", "id": "CNNVD-202210-181" }, { "db": "NVD", "id": "CVE-2022-41584" } ] }, "id": "VAR-202210-0249", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437815" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:29.939000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211158" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437815" }, { "db": "NVD", "id": "CVE-2022-41584" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41584/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437815" }, { "db": "CNNVD", "id": "CNNVD-202210-181" }, { "db": "NVD", "id": "CVE-2022-41584" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437815" }, { "db": "CNNVD", "id": "CNNVD-202210-181" }, { "db": "NVD", "id": "CVE-2022-41584" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437815" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-181" }, { "date": "2022-10-14T16:15:23.267000", "db": "NVD", "id": "CVE-2022-41584" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437815" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-181" }, { "date": "2022-10-18T17:23:17.187000", "db": "NVD", "id": "CVE-2022-41584" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-181" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-181" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-181" } ], "trust": 0.6 } }
var-202209-0121
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0121", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" } ] }, "cve": "CVE-2022-38993", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-38993", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38993", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38993", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-38993", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-205", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "CNNVD", "id": "CNNVD-202209-205" }, { "db": "NVD", "id": "CVE-2022-38993" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "VULHUB", "id": "VHN-428492" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38993", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016786", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-205", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428492", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428492" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "CNNVD", "id": "CNNVD-202209-205" }, { "db": "NVD", "id": "CVE-2022-38993" } ] }, "id": "VAR-202209-0121", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428492" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:35.222000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208095" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38993" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38993/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428492" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "CNNVD", "id": "CNNVD-202209-205" }, { "db": "NVD", "id": "CVE-2022-38993" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428492" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "CNNVD", "id": "CNNVD-202209-205" }, { "db": "NVD", "id": "CVE-2022-38993" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428492" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-205" }, { "date": "2022-09-16T18:15:17.667000", "db": "NVD", "id": "CVE-2022-38993" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428492" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-205" }, { "date": "2022-09-17T03:11:51.240000", "db": "NVD", "id": "CVE-2022-38993" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-205" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-205" } ], "trust": 0.6 } }
var-202204-1291
Vulnerability from variot
A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a fraudulent authentication vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. An attacker could exploit this vulnerability to cause unauthorized access
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1291", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "cve": "CVE-2022-22254", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-22254", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-409783", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-22254", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-22254", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-22254", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-22254", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202204-2034", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409783", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22254", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a fraudulent authentication vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. An attacker could exploit this vulnerability to cause unauthorized access", "sources": [ { "db": "NVD", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22254", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-008144", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2034", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44622", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409783", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22254", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "id": "VAR-202204-1291", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409783" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:49:51.671000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=190070" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-RCE " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Illegal authentication (CWE-863) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22254" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22254/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409783" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22254" }, { "date": "2023-07-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "date": "2022-04-11T20:15:19.567000", "db": "NVD", "id": "CVE-2022-22254" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-19T00:00:00", "db": "VULHUB", "id": "VHN-409783" }, { "date": "2023-08-08T00:00:00", "db": "VULMON", "id": "CVE-2022-22254" }, { "date": "2023-07-24T08:23:00", "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "date": "2022-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-22254" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2034" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Fraudulent Authentication Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008144" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2034" } ], "trust": 0.6 } }
var-202201-1723
Vulnerability from variot
The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in an out-of-bounds write vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There are security vulnerabilities in the Huawei HarmonyOS eID component. Successful exploitation of this vulnerability could result in compromised confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1723", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "NVD", "id": "CVE-2021-40021" } ] }, "cve": "CVE-2021-40021", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40021", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401422", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40021", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40021", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40021", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40021", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202201-278", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401422", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401422" }, { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "CNNVD", "id": "CNNVD-202201-278" }, { "db": "NVD", "id": "CVE-2021-40021" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in an out-of-bounds write vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There are security vulnerabilities in the Huawei HarmonyOS eID component. Successful exploitation of this vulnerability could result in compromised confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-40021" }, { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "VULHUB", "id": "VHN-401422" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40021", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002902", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-278", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401422", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401422" }, { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "CNNVD", "id": "CNNVD-202201-278" }, { "db": "NVD", "id": "CVE-2021-40021" } ] }, "id": "VAR-202201-1723", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401422" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:55:38.030000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177997" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "CNNVD", "id": "CNNVD-202201-278" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401422" }, { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "NVD", "id": "CVE-2021-40021" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40021" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401422" }, { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "CNNVD", "id": "CNNVD-202201-278" }, { "db": "NVD", "id": "CVE-2021-40021" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401422" }, { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "CNNVD", "id": "CNNVD-202201-278" }, { "db": "NVD", "id": "CVE-2021-40021" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401422" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-278" }, { "date": "2022-01-10T14:10:21.603000", "db": "NVD", "id": "CVE-2021-40021" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401422" }, { "date": "2023-01-25T08:56:00", "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-278" }, { "date": "2022-01-13T03:14:57.353000", "db": "NVD", "id": "CVE-2021-40021" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-278" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002902" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-278" } ], "trust": 0.6 } }
var-202110-1853
Vulnerability from variot
HHEE system has a Code Injection vulnerability.Successful exploitation of this vulnerability may affect HHEE system integrity. HarmonyOS There is a code injection vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1853", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "NVD", "id": "CVE-2021-39979" } ] }, "cve": "CVE-2021-39979", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2021-39979", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-401380", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-39979", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39979", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39979", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-39979", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202110-2228", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401380", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401380" }, { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "CNNVD", "id": "CNNVD-202110-2228" }, { "db": "NVD", "id": "CVE-2021-39979" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HHEE system has a Code Injection vulnerability.Successful exploitation of this vulnerability may affect HHEE system integrity. HarmonyOS There is a code injection vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-39979" }, { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "VULHUB", "id": "VHN-401380" }, { "db": "VULMON", "id": "CVE-2021-39979" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39979", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017587", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2228", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401380", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39979", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401380" }, { "db": "VULMON", "id": "CVE-2021-39979" }, { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "CNNVD", "id": "CNNVD-202110-2228" }, { "db": "NVD", "id": "CVE-2021-39979" } ] }, "id": "VAR-202110-1853", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401380" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:23:13.139000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176776" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "CNNVD", "id": "CNNVD-202110-2228" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "Code injection (CWE-94) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401380" }, { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "NVD", "id": "CVE-2021-39979" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39979" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401380" }, { "db": "VULMON", "id": "CVE-2021-39979" }, { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "CNNVD", "id": "CNNVD-202110-2228" }, { "db": "NVD", "id": "CVE-2021-39979" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401380" }, { "db": "VULMON", "id": "CVE-2021-39979" }, { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "CNNVD", "id": "CNNVD-202110-2228" }, { "db": "NVD", "id": "CVE-2021-39979" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401380" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39979" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2228" }, { "date": "2022-01-03T22:15:10.523000", "db": "NVD", "id": "CVE-2021-39979" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401380" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39979" }, { "date": "2023-01-27T03:22:00", "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2228" }, { "date": "2022-01-13T15:39:19.687000", "db": "NVD", "id": "CVE-2021-39979" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2228" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Code injection vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017587" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2228" } ], "trust": 0.6 } }
var-202112-0231
Vulnerability from variot
There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can create arbitrary file. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0231", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "NVD", "id": "CVE-2021-37087" } ] }, "cve": "CVE-2021-37087", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37087", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398922", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37087", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37087", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37087", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37087", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2005", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398922", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398922" }, { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "CNNVD", "id": "CNNVD-202109-2005" }, { "db": "NVD", "id": "CVE-2021-37087" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can create arbitrary file. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-37087" }, { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "VULHUB", "id": "VHN-398922" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37087", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015944", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2005", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398922", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398922" }, { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "CNNVD", "id": "CNNVD-202109-2005" }, { "db": "NVD", "id": "CVE-2021-37087" } ] }, "id": "VAR-202112-0231", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398922" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:29.745000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173485" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "CNNVD", "id": "CNNVD-202109-2005" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398922" }, { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "NVD", "id": "CVE-2021-37087" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37087" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398922" }, { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "CNNVD", "id": "CNNVD-202109-2005" }, { "db": "NVD", "id": "CVE-2021-37087" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398922" }, { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "CNNVD", "id": "CNNVD-202109-2005" }, { "db": "NVD", "id": "CVE-2021-37087" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398922" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2005" }, { "date": "2021-12-07T17:15:09.610000", "db": "NVD", "id": "CVE-2021-37087" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398922" }, { "date": "2022-12-05T01:35:00", "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2005" }, { "date": "2021-12-09T17:34:51.353000", "db": "NVD", "id": "CVE-2021-37087" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2005" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Path Traversal Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015944" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2005" } ], "trust": 0.6 } }
var-202112-0230
Vulnerability from variot
There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can write any content to any file. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0230", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "NVD", "id": "CVE-2021-37088" } ] }, "cve": "CVE-2021-37088", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37088", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398923", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37088", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37088", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37088", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37088", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2004", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398923", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398923" }, { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "CNNVD", "id": "CNNVD-202109-2004" }, { "db": "NVD", "id": "CVE-2021-37088" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can write any content to any file. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37088" }, { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "VULHUB", "id": "VHN-398923" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37088", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015942", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2004", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103541", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398923", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398923" }, { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "CNNVD", "id": "CNNVD-202109-2004" }, { "db": "NVD", "id": "CVE-2021-37088" } ] }, "id": "VAR-202112-0230", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398923" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:55:44.480000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173484" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "CNNVD", "id": "CNNVD-202109-2004" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398923" }, { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "NVD", "id": "CVE-2021-37088" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37088" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398923" }, { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "CNNVD", "id": "CNNVD-202109-2004" }, { "db": "NVD", "id": "CVE-2021-37088" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398923" }, { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "CNNVD", "id": "CNNVD-202109-2004" }, { "db": "NVD", "id": "CVE-2021-37088" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398923" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2004" }, { "date": "2021-12-07T17:15:09.653000", "db": "NVD", "id": "CVE-2021-37088" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398923" }, { "date": "2022-12-05T01:31:00", "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2004" }, { "date": "2021-12-09T18:02:07.453000", "db": "NVD", "id": "CVE-2021-37088" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2004" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Path Traversal Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015942" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2004" } ], "trust": 0.6 } }
var-202201-1027
Vulnerability from variot
The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data integrity. HarmonyOS Exists in an out-of-bounds write vulnerability.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Successful exploitation of this vulnerability could result in compromised integrity
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1027", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "NVD", "id": "CVE-2021-40028" } ] }, "cve": "CVE-2021-40028", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40028", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401429", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40028", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40028", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40028", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40028", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202201-285", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401429", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401429" }, { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "CNNVD", "id": "CNNVD-202201-285" }, { "db": "NVD", "id": "CVE-2021-40028" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data integrity. HarmonyOS Exists in an out-of-bounds write vulnerability.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Successful exploitation of this vulnerability could result in compromised integrity", "sources": [ { "db": "NVD", "id": "CVE-2021-40028" }, { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "VULHUB", "id": "VHN-401429" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40028", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002898", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-285", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401429", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401429" }, { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "CNNVD", "id": "CNNVD-202201-285" }, { "db": "NVD", "id": "CVE-2021-40028" } ] }, "id": "VAR-202201-1027", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401429" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:38.385000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=178000" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "CNNVD", "id": "CNNVD-202201-285" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401429" }, { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "NVD", "id": "CVE-2021-40028" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40028" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401429" }, { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "CNNVD", "id": "CNNVD-202201-285" }, { "db": "NVD", "id": "CVE-2021-40028" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401429" }, { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "CNNVD", "id": "CNNVD-202201-285" }, { "db": "NVD", "id": "CVE-2021-40028" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401429" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-285" }, { "date": "2022-01-10T14:10:21.867000", "db": "NVD", "id": "CVE-2021-40028" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401429" }, { "date": "2023-01-25T08:24:00", "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-285" }, { "date": "2022-01-13T14:31:05.617000", "db": "NVD", "id": "CVE-2021-40028" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-285" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002898" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-285" } ], "trust": 0.6 } }
var-202212-0586
Vulnerability from variot
The IPC module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0586", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "db": "NVD", "id": "CVE-2022-46314" } ] }, "cve": "CVE-2022-46314", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-46314", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46314", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46314", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-46314", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202212-2501", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "db": "CNNVD", "id": "CNNVD-202212-2501" }, { "db": "NVD", "id": "CVE-2022-46314" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The IPC module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46314" }, { "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "db": "VULHUB", "id": "VHN-444284" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46314", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023887", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2501", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444284", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444284" }, { "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "db": "CNNVD", "id": "CNNVD-202212-2501" }, { "db": "NVD", "id": "CVE-2022-46314" } ] }, "id": "VAR-202212-0586", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444284" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:26:57.683000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218954" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2501" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "db": "NVD", "id": "CVE-2022-46314" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46314" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46314/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444284" }, { "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "db": "CNNVD", "id": "CNNVD-202212-2501" }, { "db": "NVD", "id": "CVE-2022-46314" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444284" }, { "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "db": "CNNVD", "id": "CNNVD-202212-2501" }, { "db": "NVD", "id": "CVE-2022-46314" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444284" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2501" }, { "date": "2022-12-20T21:15:11.347000", "db": "NVD", "id": "CVE-2022-46314" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444284" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2501" }, { "date": "2022-12-24T04:14:59.490000", "db": "NVD", "id": "CVE-2022-46314" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2501" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023887" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2501" } ], "trust": 0.6 } }
var-202111-1783
Vulnerability from variot
The HwNearbyMain module has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability may cause a process to restart. HarmonyOS Exists in a vulnerability related to illegal type conversion.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS HwNearbyMain
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1783", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "NVD", "id": "CVE-2021-39989" } ] }, "cve": "CVE-2021-39989", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-39989", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401390", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-39989", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39989", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39989", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39989", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-2123", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401390", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401390" }, { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "CNNVD", "id": "CNNVD-202111-2123" }, { "db": "NVD", "id": "CVE-2021-39989" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwNearbyMain module has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability may cause a process to restart. HarmonyOS Exists in a vulnerability related to illegal type conversion.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS HwNearbyMain", "sources": [ { "db": "NVD", "id": "CVE-2021-39989" }, { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "VULHUB", "id": "VHN-401390" }, { "db": "VULMON", "id": "CVE-2021-39989" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39989", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017725", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2123", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08454", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401390", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39989", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401390" }, { "db": "VULMON", "id": "CVE-2021-39989" }, { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "CNNVD", "id": "CNNVD-202111-2123" }, { "db": "NVD", "id": "CVE-2021-39989" } ] }, "id": "VAR-202111-1783", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401390" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:57.339000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176784" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "CNNVD", "id": "CNNVD-202111-2123" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-704", "trust": 1.1 }, { "problemtype": "Illegal type conversion or cast (CWE-704) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401390" }, { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "NVD", "id": "CVE-2021-39989" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39989" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401390" }, { "db": "VULMON", "id": "CVE-2021-39989" }, { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "CNNVD", "id": "CNNVD-202111-2123" }, { "db": "NVD", "id": "CVE-2021-39989" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401390" }, { "db": "VULMON", "id": "CVE-2021-39989" }, { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "CNNVD", "id": "CNNVD-202111-2123" }, { "db": "NVD", "id": "CVE-2021-39989" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401390" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39989" }, { "date": "2023-02-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2123" }, { "date": "2022-01-03T22:15:10.980000", "db": "NVD", "id": "CVE-2021-39989" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-14T00:00:00", "db": "VULHUB", "id": "VHN-401390" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39989" }, { "date": "2023-02-02T02:24:00", "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2123" }, { "date": "2022-01-14T16:00:42.303000", "db": "NVD", "id": "CVE-2021-39989" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2123" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Illegal type conversion vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017725" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2123" } ], "trust": 0.6 } }
var-202204-0765
Vulnerability from variot
The device authentication service module has a defect vulnerability introduced in the design process.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS There is an authentication vulnerability in.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to bypass web authentication and gain administrative access to the device
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0765", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "NVD", "id": "CVE-2021-46740" } ] }, "cve": "CVE-2021-46740", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-46740", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-418649", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-46740", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46740", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46740", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-46740", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202204-2012", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418649", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46740", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "CNNVD", "id": "CNNVD-202204-2012" }, { "db": "NVD", "id": "CVE-2021-46740" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The device authentication service module has a defect vulnerability introduced in the design process.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS There is an authentication vulnerability in.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to bypass web authentication and gain administrative access to the device", "sources": [ { "db": "NVD", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46740", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007972", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2012", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44619", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-418649", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46740", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "CNNVD", "id": "CNNVD-202204-2012" }, { "db": "NVD", "id": "CVE-2021-46740" } ] }, "id": "VAR-202204-0765", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418649" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:18:01.476000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=189571" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "NVD", "id": "CVE-2021-46740" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46740" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46740/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "CNNVD", "id": "CNNVD-202204-2012" }, { "db": "NVD", "id": "CVE-2021-46740" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "CNNVD", "id": "CNNVD-202204-2012" }, { "db": "NVD", "id": "CVE-2021-46740" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-418649" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2021-46740" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2012" }, { "date": "2022-04-11T20:15:16.350000", "db": "NVD", "id": "CVE-2021-46740" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-15T00:00:00", "db": "VULHUB", "id": "VHN-418649" }, { "date": "2022-04-15T00:00:00", "db": "VULMON", "id": "CVE-2021-46740" }, { "date": "2023-07-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "date": "2022-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2012" }, { "date": "2022-04-15T20:06:33.793000", "db": "NVD", "id": "CVE-2021-46740" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2012" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007972" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2012" } ], "trust": 0.6 } }
var-202107-1680
Vulnerability from variot
There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1680", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" } ] }, "cve": "CVE-2021-22430", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22430", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380865", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-22430", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22430", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22430", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-22430", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202107-2225", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380865", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" }, { "db": "NVD", "id": "CVE-2021-22430" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "VULHUB", "id": "VHN-380865" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22430", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018745", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2225", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380865", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" }, { "db": "NVD", "id": "CVE-2021-22430" } ] }, "id": "VAR-202107-1680", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380865" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:03:06.958000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171998" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-94", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22430" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22430/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" }, { "db": "NVD", "id": "CVE-2021-22430" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" }, { "db": "NVD", "id": "CVE-2021-22430" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380865" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2225" }, { "date": "2022-02-25T19:15:09.610000", "db": "NVD", "id": "CVE-2021-22430" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380865" }, { "date": "2023-07-06T01:50:00", "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2225" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22430" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2225" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018745" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2225" } ], "trust": 0.6 } }
var-202111-1773
Vulnerability from variot
Huawei idap module has a Out-of-bounds Read vulnerability.Successful exploitation of this vulnerability may cause Denial of Service. HarmonyOS Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1773", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "NVD", "id": "CVE-2021-39984" } ] }, "cve": "CVE-2021-39984", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-39984", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401385", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-39984", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39984", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39984", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39984", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-2127", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401385", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401385" }, { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "CNNVD", "id": "CNNVD-202111-2127" }, { "db": "NVD", "id": "CVE-2021-39984" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei idap module has a Out-of-bounds Read vulnerability.Successful exploitation of this vulnerability may cause Denial of Service. HarmonyOS Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-39984" }, { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "VULHUB", "id": "VHN-401385" }, { "db": "VULMON", "id": "CVE-2021-39984" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39984", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017582", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2127", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08314", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401385", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39984", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401385" }, { "db": "VULMON", "id": "CVE-2021-39984" }, { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "CNNVD", "id": "CNNVD-202111-2127" }, { "db": "NVD", "id": "CVE-2021-39984" } ] }, "id": "VAR-202111-1773", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401385" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:37:49.050000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176788" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "CNNVD", "id": "CNNVD-202111-2127" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401385" }, { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "NVD", "id": "CVE-2021-39984" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39984" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401385" }, { "db": "VULMON", "id": "CVE-2021-39984" }, { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "CNNVD", "id": "CNNVD-202111-2127" }, { "db": "NVD", "id": "CVE-2021-39984" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401385" }, { "db": "VULMON", "id": "CVE-2021-39984" }, { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "CNNVD", "id": "CNNVD-202111-2127" }, { "db": "NVD", "id": "CVE-2021-39984" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401385" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39984" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2127" }, { "date": "2022-01-03T22:15:10.793000", "db": "NVD", "id": "CVE-2021-39984" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401385" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39984" }, { "date": "2023-01-27T03:04:00", "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2127" }, { "date": "2022-01-13T17:40:23.130000", "db": "NVD", "id": "CVE-2021-39984" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2127" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017582" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2127" } ], "trust": 0.6 } }
var-202207-0974
Vulnerability from variot
Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is an information disclosure vulnerability in HUAWEI EMUI 12.0.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0974", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40012" } ] }, "cve": "CVE-2021-40012", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40012", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401413", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40012", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40012", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-1044", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401413", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-40012", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" }, { "db": "NVD", "id": "CVE-2021-40012" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is an information disclosure vulnerability in HUAWEI EMUI 12.0.0", "sources": [ { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40012", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202207-1044", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-52818", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401413", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40012", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" }, { "db": "NVD", "id": "CVE-2021-40012" } ] }, "id": "VAR-202207-0974", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401413" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:00:54.379000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=203734" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "NVD", "id": "CVE-2021-40012" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40012/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/668.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" }, { "db": "NVD", "id": "CVE-2021-40012" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" }, { "db": "NVD", "id": "CVE-2021-40012" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401413" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2021-40012" }, { "date": "2022-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1044" }, { "date": "2022-07-12T14:15:14.680000", "db": "NVD", "id": "CVE-2021-40012" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-12T00:00:00", "db": "VULHUB", "id": "VHN-401413" }, { "date": "2022-07-15T00:00:00", "db": "VULMON", "id": "CVE-2021-40012" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1044" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-40012" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI EMUI Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ], "trust": 0.6 } }
var-202207-0144
Vulnerability from variot
The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0144", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" } ] }, "cve": "CVE-2022-34743", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-34743", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-427078", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-34743", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34743", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-34743", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-34743", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202207-417", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427078", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34743", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "CNNVD", "id": "CNNVD-202207-417" }, { "db": "NVD", "id": "CVE-2022-34743" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34743", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013197", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-417", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52823", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427078", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34743", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "CNNVD", "id": "CNNVD-202207-417" }, { "db": "NVD", "id": "CVE-2022-34743" } ] }, "id": "VAR-202207-0144", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427078" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:38.562000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=200889" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34743" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34743/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "CNNVD", "id": "CNNVD-202207-417" }, { "db": "NVD", "id": "CVE-2022-34743" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "CNNVD", "id": "CNNVD-202207-417" }, { "db": "NVD", "id": "CVE-2022-34743" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427078" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34743" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-417" }, { "date": "2022-07-12T14:15:19.570000", "db": "NVD", "id": "CVE-2022-34743" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427078" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34743" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "date": "2022-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-417" }, { "date": "2022-07-19T12:53:51.187000", "db": "NVD", "id": "CVE-2022-34743" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-417" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013197" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-417" } ], "trust": 0.6 } }
var-202204-1111
Vulnerability from variot
The Wi-Fi module has an event notification vulnerability.Successful exploitation of this vulnerability may allow third-party applications to intercept event notifications and add information and result in elevation-of-privilege. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a privilege escalation vulnerability in the Huawei HarmonyOS WIFI module. The vulnerability stems from an erroneous program calling a high-level native procedure. An attacker could exploit this vulnerability for privilege escalation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1111", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "cve": "CVE-2022-22258", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-22258", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-409787", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-22258", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-22258", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-22258", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-22258", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202204-2033", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-409787", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-22258", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Wi-Fi module has an event notification vulnerability.Successful exploitation of this vulnerability may allow third-party applications to intercept event notifications and add information and result in elevation-of-privilege. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a privilege escalation vulnerability in the Huawei HarmonyOS WIFI module. The vulnerability stems from an erroneous program calling a high-level native procedure. An attacker could exploit this vulnerability for privilege escalation", "sources": [ { "db": "NVD", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22258", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007942", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2033", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44621", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409787", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22258", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "id": "VAR-202204-1111", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409787" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:14.072000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=189781" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-RCE " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22258" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22258/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409787" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22258" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "date": "2022-04-11T20:15:19.747000", "db": "NVD", "id": "CVE-2022-22258" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-30T00:00:00", "db": "VULHUB", "id": "VHN-409787" }, { "date": "2022-09-30T00:00:00", "db": "VULMON", "id": "CVE-2022-22258" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "date": "2022-05-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "date": "2022-09-30T13:10:13.337000", "db": "NVD", "id": "CVE-2022-22258" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2033" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007942" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2033" } ], "trust": 0.6 } }
var-202209-0152
Vulnerability from variot
The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0152", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "NVD", "id": "CVE-2022-39007" } ] }, "cve": "CVE-2022-39007", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-39007", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39007", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-39007", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-39007", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202209-164", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "CNNVD", "id": "CNNVD-202209-164" }, { "db": "NVD", "id": "CVE-2022-39007" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-39007" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "VULHUB", "id": "VHN-434775" }, { "db": "VULMON", "id": "CVE-2022-39007" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39007", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017587", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-164", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434775", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39007", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434775" }, { "db": "VULMON", "id": "CVE-2022-39007" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "CNNVD", "id": "CNNVD-202209-164" }, { "db": "NVD", "id": "CVE-2022-39007" } ] }, "id": "VAR-202209-0152", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434775" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:21:43.810000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=208616" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-287", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434775" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "NVD", "id": "CVE-2022-39007" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39007" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39007/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434775" }, { "db": "VULMON", "id": "CVE-2022-39007" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "CNNVD", "id": "CNNVD-202209-164" }, { "db": "NVD", "id": "CVE-2022-39007" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434775" }, { "db": "VULMON", "id": "CVE-2022-39007" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "CNNVD", "id": "CNNVD-202209-164" }, { "db": "NVD", "id": "CVE-2022-39007" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434775" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39007" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-164" }, { "date": "2022-09-16T18:15:18.170000", "db": "NVD", "id": "CVE-2022-39007" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434775" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39007" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-164" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-39007" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-164" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017587" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-164" } ], "trust": 0.6 } }
var-202206-0002
Vulnerability from variot
HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. Attackers can exploit this vulnerability to obtain CPLC information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0002", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" } ] }, "cve": "CVE-2021-46811", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-46811", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-423544", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2021-46811", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-46811", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46811", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-46811", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202206-468", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423544", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "CNNVD", "id": "CNNVD-202206-468" }, { "db": "NVD", "id": "CVE-2021-46811" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. Attackers can exploit this vulnerability to obtain CPLC information", "sources": [ { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46811", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012101", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-468", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-51605", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423544", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46811", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "CNNVD", "id": "CNNVD-202206-468" }, { "db": "NVD", "id": "CVE-2021-46811" } ] }, "id": "VAR-202206-0002", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423544" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:10.949000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46811" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46811/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "CNNVD", "id": "CNNVD-202206-468" }, { "db": "NVD", "id": "CVE-2021-46811" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "CNNVD", "id": "CNNVD-202206-468" }, { "db": "NVD", "id": "CVE-2021-46811" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423544" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46811" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-468" }, { "date": "2022-06-13T16:15:08.080000", "db": "NVD", "id": "CVE-2021-46811" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423544" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46811" }, { "date": "2023-08-25T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-468" }, { "date": "2022-06-27T16:09:54.217000", "db": "NVD", "id": "CVE-2021-46811" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-468" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012101" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-468" } ], "trust": 0.6 } }
var-202111-1766
Vulnerability from variot
There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource initialization vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1766", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" } ] }, "cve": "CVE-2021-39966", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-39966", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401367", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-39966", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39966", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39966", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39966", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-2134", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401367", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" }, { "db": "NVD", "id": "CVE-2021-39966" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource initialization vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39966", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017615", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2134", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-14783", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401367", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39966", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" }, { "db": "NVD", "id": "CVE-2021-39966" } ] }, "id": "VAR-202111-1766", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401367" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:59.156000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176795" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-909", "trust": 1.1 }, { "problemtype": "Inadequate resource initialization (CWE-909) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39966" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" }, { "db": "NVD", "id": "CVE-2021-39966" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" }, { "db": "NVD", "id": "CVE-2021-39966" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401367" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39966" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2134" }, { "date": "2022-01-03T22:15:09.957000", "db": "NVD", "id": "CVE-2021-39966" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401367" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39966" }, { "date": "2023-01-27T07:28:00", "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2134" }, { "date": "2022-01-13T16:22:11.833000", "db": "NVD", "id": "CVE-2021-39966" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2134" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to insufficient initialization of resources in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017615" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2134" } ], "trust": 0.6 } }
var-202212-0487
Vulnerability from variot
A thread security vulnerability exists in the authentication process. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability. Huawei of HarmonyOS There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0487", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "db": "NVD", "id": "CVE-2022-46316" } ] }, "cve": "CVE-2022-46316", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-46316", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46316", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46316", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-46316", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202212-2493", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "db": "CNNVD", "id": "CNNVD-202212-2493" }, { "db": "NVD", "id": "CVE-2022-46316" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A thread security vulnerability exists in the authentication process. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability. Huawei of HarmonyOS There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46316" }, { "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "db": "VULHUB", "id": "VHN-444286" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46316", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023889", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2493", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444286", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444286" }, { "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "db": "CNNVD", "id": "CNNVD-202212-2493" }, { "db": "NVD", "id": "CVE-2022-46316" } ] }, "id": "VAR-202212-0487", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444286" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:21.013000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218949" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2493" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444286" }, { "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "db": "NVD", "id": "CVE-2022-46316" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46316" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46316/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444286" }, { "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "db": "CNNVD", "id": "CNNVD-202212-2493" }, { "db": "NVD", "id": "CVE-2022-46316" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444286" }, { "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "db": "CNNVD", "id": "CNNVD-202212-2493" }, { "db": "NVD", "id": "CVE-2022-46316" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444286" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2493" }, { "date": "2022-12-20T21:15:11.443000", "db": "NVD", "id": "CVE-2022-46316" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444286" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2493" }, { "date": "2022-12-24T04:15:25.557000", "db": "NVD", "id": "CVE-2022-46316" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2493" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023889" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2493" } ], "trust": 0.6 } }
var-202206-0260
Vulnerability from variot
The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0260", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31758" } ] }, "cve": "CVE-2022-31758", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "CVE-2022-31758", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.1, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "VHN-423591", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.0, "id": "CVE-2022-31758", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-31758", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-479", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423591", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-31758", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" }, { "db": "NVD", "id": "CVE-2022-31758" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31758", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202206-479", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66182", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423591", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31758", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" }, { "db": "NVD", "id": "CVE-2022-31758" } ] }, "id": "VAR-202206-0260", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423591" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:55:26.749000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=196950" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "NVD", "id": "CVE-2022-31758" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31758/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/362.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" }, { "db": "NVD", "id": "CVE-2022-31758" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" }, { "db": "NVD", "id": "CVE-2022-31758" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423591" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31758" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-479" }, { "date": "2022-06-13T15:15:10.227000", "db": "NVD", "id": "CVE-2022-31758" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-21T00:00:00", "db": "VULHUB", "id": "VHN-423591" }, { "date": "2022-06-21T00:00:00", "db": "VULMON", "id": "CVE-2022-31758" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-479" }, { "date": "2022-06-21T18:08:15.080000", "db": "NVD", "id": "CVE-2022-31758" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI HarmonyOS Competitive conditional vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ], "trust": 0.6 } }
var-202111-0848
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the availability of users is affected. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0848", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "NVD", "id": "CVE-2021-37013" } ] }, "cve": "CVE-2021-37013", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37013", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398845", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37013", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37013", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37013", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-37013", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202111-1882", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398845", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398845" }, { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "CNNVD", "id": "CNNVD-202111-1882" }, { "db": "NVD", "id": "CVE-2021-37013" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the availability of users is affected. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37013" }, { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "VULHUB", "id": "VHN-398845" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37013", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015586", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1882", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398845", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398845" }, { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "CNNVD", "id": "CNNVD-202111-1882" }, { "db": "NVD", "id": "CVE-2021-37013" } ] }, "id": "VAR-202111-0848", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398845" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:44:13.804000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172181" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "CNNVD", "id": "CNNVD-202111-1882" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398845" }, { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "NVD", "id": "CVE-2021-37013" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37013" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398845" }, { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "CNNVD", "id": "CNNVD-202111-1882" }, { "db": "NVD", "id": "CVE-2021-37013" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398845" }, { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "CNNVD", "id": "CNNVD-202111-1882" }, { "db": "NVD", "id": "CVE-2021-37013" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398845" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1882" }, { "date": "2021-11-23T16:15:09.200000", "db": "NVD", "id": "CVE-2021-37013" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398845" }, { "date": "2022-11-24T09:07:00", "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1882" }, { "date": "2021-11-29T15:21:34.720000", "db": "NVD", "id": "CVE-2021-37013" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1882" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015586" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1882" } ], "trust": 0.6 } }
var-202111-1765
Vulnerability from variot
Hisuite module has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability may lead to Firmware leak. HarmonyOS Exists in a vulnerability in externally controllable references to resources in another region.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1765", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "NVD", "id": "CVE-2021-37112" } ] }, "cve": "CVE-2021-37112", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37112", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398948", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37112", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37112", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37112", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-37112", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202111-2135", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398948", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398948" }, { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "CNNVD", "id": "CNNVD-202111-2135" }, { "db": "NVD", "id": "CVE-2021-37112" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Hisuite module has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability may lead to Firmware leak. HarmonyOS Exists in a vulnerability in externally controllable references to resources in another region.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-37112" }, { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "VULHUB", "id": "VHN-398948" }, { "db": "VULMON", "id": "CVE-2021-37112" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37112", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017378", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2135", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398948", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37112", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398948" }, { "db": "VULMON", "id": "CVE-2021-37112" }, { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "CNNVD", "id": "CNNVD-202111-2135" }, { "db": "NVD", "id": "CVE-2021-37112" } ] }, "id": "VAR-202111-1765", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398948" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:01:16.029000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176796" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "CNNVD", "id": "CNNVD-202111-2135" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.0 }, { "problemtype": "Externally controllable reference to another region resource (CWE-610) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-610", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398948" }, { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "NVD", "id": "CVE-2021-37112" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37112" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398948" }, { "db": "VULMON", "id": "CVE-2021-37112" }, { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "CNNVD", "id": "CNNVD-202111-2135" }, { "db": "NVD", "id": "CVE-2021-37112" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398948" }, { "db": "VULMON", "id": "CVE-2021-37112" }, { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "CNNVD", "id": "CNNVD-202111-2135" }, { "db": "NVD", "id": "CVE-2021-37112" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398948" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37112" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2135" }, { "date": "2022-01-03T22:15:09.113000", "db": "NVD", "id": "CVE-2021-37112" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398948" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37112" }, { "date": "2023-01-17T07:01:00", "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2135" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37112" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2135" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in externally controllable references to resources in another region of", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017378" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2135" } ], "trust": 0.6 } }
var-202212-0767
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0767", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "NVD", "id": "CVE-2022-46322" } ] }, "cve": "CVE-2022-46322", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-46322", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46322", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46322", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-46322", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202212-2526", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "CNNVD", "id": "CNNVD-202212-2526" }, { "db": "NVD", "id": "CVE-2022-46322" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46322" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "VULHUB", "id": "VHN-444292" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46322", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024014", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2526", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444292", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444292" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "CNNVD", "id": "CNNVD-202212-2526" }, { "db": "NVD", "id": "CVE-2022-46322" } ] }, "id": "VAR-202212-0767", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444292" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:21:25.253000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218963" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444292" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "NVD", "id": "CVE-2022-46322" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46322" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46322/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444292" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "CNNVD", "id": "CNNVD-202212-2526" }, { "db": "NVD", "id": "CVE-2022-46322" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444292" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "CNNVD", "id": "CNNVD-202212-2526" }, { "db": "NVD", "id": "CVE-2022-46322" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444292" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2526" }, { "date": "2022-12-20T21:15:11.740000", "db": "NVD", "id": "CVE-2022-46322" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444292" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2526" }, { "date": "2022-12-24T04:17:30.480000", "db": "NVD", "id": "CVE-2022-46322" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2526" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024014" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2526" } ], "trust": 0.6 } }
var-202212-0584
Vulnerability from variot
Some smartphones have authentication-related (including session management) vulnerabilities as the setup wizard is bypassed. Successful exploitation of this vulnerability affects the smartphone availability. HarmonyOS There is an authentication vulnerability in.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0584", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "NVD", "id": "CVE-2022-41590" } ] }, "cve": "CVE-2022-41590", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2022-41590", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41590", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41590", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-41590", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202212-2512", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "CNNVD", "id": "CNNVD-202212-2512" }, { "db": "NVD", "id": "CVE-2022-41590" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have authentication-related (including session management) vulnerabilities as the setup wizard is bypassed. Successful exploitation of this vulnerability affects the smartphone availability. HarmonyOS There is an authentication vulnerability in.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-41590" }, { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "VULHUB", "id": "VHN-437826" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41590", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-003426", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2512", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437826", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437826" }, { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "CNNVD", "id": "CNNVD-202212-2512" }, { "db": "NVD", "id": "CVE-2022-41590" } ] }, "id": "VAR-202212-0584", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437826" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:49:28.873000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202212-0000001462975397", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=219373" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "CNNVD", "id": "CNNVD-202212-2512" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437826" }, { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "NVD", "id": "CVE-2022-41590" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41590" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41590/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437826" }, { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "CNNVD", "id": "CNNVD-202212-2512" }, { "db": "NVD", "id": "CVE-2022-41590" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437826" }, { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "CNNVD", "id": "CNNVD-202212-2512" }, { "db": "NVD", "id": "CVE-2022-41590" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-437826" }, { "date": "2023-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2512" }, { "date": "2022-12-20T21:15:10.807000", "db": "NVD", "id": "CVE-2022-41590" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-29T00:00:00", "db": "VULHUB", "id": "VHN-437826" }, { "date": "2023-02-17T01:48:00", "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "date": "2022-12-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2512" }, { "date": "2022-12-29T18:47:59.580000", "db": "NVD", "id": "CVE-2022-41590" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2512" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003426" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2512" } ], "trust": 0.6 } }
var-202202-1399
Vulnerability from variot
There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability. EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1399", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" } ] }, "cve": "CVE-2021-40015", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "id": "CVE-2021-40015", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "id": "VHN-401416", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.0, "id": "CVE-2021-40015", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 4.7, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40015", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40015", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-40015", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202202-443", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401416", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "CNNVD", "id": "CNNVD-202202-443" }, { "db": "NVD", "id": "CVE-2021-40015" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability. EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "VULHUB", "id": "VHN-401416" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40015", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005385", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-443", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401416", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "CNNVD", "id": "CNNVD-202202-443" }, { "db": "NVD", "id": "CVE-2021-40015" } ] }, "id": "VAR-202202-1399", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401416" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:01:07.493000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202202-0000001204253396 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=182402" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40015" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202202-0000001203413350" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "CNNVD", "id": "CNNVD-202202-443" }, { "db": "NVD", "id": "CVE-2021-40015" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "CNNVD", "id": "CNNVD-202202-443" }, { "db": "NVD", "id": "CVE-2021-40015" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401416" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "date": "2022-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-443" }, { "date": "2022-02-09T23:15:16.313000", "db": "NVD", "id": "CVE-2021-40015" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-16T00:00:00", "db": "VULHUB", "id": "VHN-401416" }, { "date": "2023-05-30T04:58:00", "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-443" }, { "date": "2022-02-16T02:19:28.473000", "db": "NVD", "id": "CVE-2021-40015" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-443" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product race condition vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005385" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-443" } ], "trust": 0.6 } }
var-202209-0278
Vulnerability from variot
Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0278", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "NVD", "id": "CVE-2021-46836" } ] }, "cve": "CVE-2021-46836", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-46836", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46836", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46836", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-46836", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-213", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "CNNVD", "id": "CNNVD-202209-213" }, { "db": "NVD", "id": "CVE-2021-46836" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2021-46836" }, { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "VULHUB", "id": "VHN-428486" }, { "db": "VULMON", "id": "CVE-2021-46836" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46836", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017272", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-213", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-64979", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428486", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46836", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428486" }, { "db": "VULMON", "id": "CVE-2021-46836" }, { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "CNNVD", "id": "CNNVD-202209-213" }, { "db": "NVD", "id": "CVE-2021-46836" } ] }, "id": "VAR-202209-0278", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428486" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:21:43.696000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208410" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "NVD", "id": "CVE-2021-46836" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46836" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46836/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428486" }, { "db": "VULMON", "id": "CVE-2021-46836" }, { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "CNNVD", "id": "CNNVD-202209-213" }, { "db": "NVD", "id": "CVE-2021-46836" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428486" }, { "db": "VULMON", "id": "CVE-2021-46836" }, { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "CNNVD", "id": "CNNVD-202209-213" }, { "db": "NVD", "id": "CVE-2021-46836" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428486" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-46836" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-213" }, { "date": "2022-09-16T18:15:11.757000", "db": "NVD", "id": "CVE-2021-46836" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-428486" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-46836" }, { "date": "2023-10-11T08:55:00", "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-213" }, { "date": "2022-09-20T16:56:03.127000", "db": "NVD", "id": "CVE-2021-46836" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-213" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017272" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-213" } ], "trust": 0.6 } }
var-202211-0418
Vulnerability from variot
The launcher module has an Intent redirection vulnerability. Successful exploitation of this vulnerability may cause launcher module data to be modified
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0418", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44560" } ] }, "cve": "CVE-2022-44560", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-44560", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44560", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202211-2125", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2125" }, { "db": "NVD", "id": "CVE-2022-44560" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The launcher module has an Intent redirection vulnerability. Successful exploitation of this vulnerability may cause launcher module data to be modified", "sources": [ { "db": "NVD", "id": "CVE-2022-44560" }, { "db": "VULHUB", "id": "VHN-441950" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44560", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2125", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441950", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441950" }, { "db": "CNNVD", "id": "CNNVD-202211-2125" }, { "db": "NVD", "id": "CVE-2022-44560" } ] }, "id": "VAR-202211-0418", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441950" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:26:59.307000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213629" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44560" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44560/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441950" }, { "db": "CNNVD", "id": "CNNVD-202211-2125" }, { "db": "NVD", "id": "CVE-2022-44560" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441950" }, { "db": "CNNVD", "id": "CNNVD-202211-2125" }, { "db": "NVD", "id": "CVE-2022-44560" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441950" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2125" }, { "date": "2022-11-09T21:15:18.803000", "db": "NVD", "id": "CVE-2022-44560" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-17T00:00:00", "db": "VULHUB", "id": "VHN-441950" }, { "date": "2022-11-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2125" }, { "date": "2022-11-17T15:16:33.273000", "db": "NVD", "id": "CVE-2022-44560" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2125" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2125" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2125" } ], "trust": 0.6 } }
var-202111-0849
Vulnerability from variot
There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0849", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "NVD", "id": "CVE-2021-37012" } ] }, "cve": "CVE-2021-37012", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37012", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398844", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37012", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37012", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37012", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37012", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1880", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398844", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398844" }, { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "CNNVD", "id": "CNNVD-202111-1880" }, { "db": "NVD", "id": "CVE-2021-37012" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37012" }, { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "VULHUB", "id": "VHN-398844" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37012", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015587", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1880", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398844", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398844" }, { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "CNNVD", "id": "CNNVD-202111-1880" }, { "db": "NVD", "id": "CVE-2021-37012" } ] }, "id": "VAR-202111-0849", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398844" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:37:49.631000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172179" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "CNNVD", "id": "CNNVD-202111-1880" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "NVD", "id": "CVE-2021-37012" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37012" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398844" }, { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "CNNVD", "id": "CNNVD-202111-1880" }, { "db": "NVD", "id": "CVE-2021-37012" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398844" }, { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "CNNVD", "id": "CNNVD-202111-1880" }, { "db": "NVD", "id": "CVE-2021-37012" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398844" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1880" }, { "date": "2021-11-23T16:15:09.157000", "db": "NVD", "id": "CVE-2021-37012" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398844" }, { "date": "2022-11-24T09:11:00", "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1880" }, { "date": "2021-11-29T15:31:18.310000", "db": "NVD", "id": "CVE-2021-37012" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1880" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015587" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1880" } ], "trust": 0.6 } }
var-202110-1847
Vulnerability from variot
There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1847", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" } ] }, "cve": "CVE-2021-37113", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37113", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398949", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37113", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37113", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37113", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37113", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2234", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398949", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" }, { "db": "NVD", "id": "CVE-2021-37113" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37113", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017592", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2234", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08458", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398949", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37113", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" }, { "db": "NVD", "id": "CVE-2021-37113" } ] }, "id": "VAR-202110-1847", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398949" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:50:05.332000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176782" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37113" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" }, { "db": "NVD", "id": "CVE-2021-37113" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" }, { "db": "NVD", "id": "CVE-2021-37113" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398949" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37113" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2234" }, { "date": "2022-01-03T22:15:09.170000", "db": "NVD", "id": "CVE-2021-37113" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398949" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37113" }, { "date": "2023-01-27T06:03:00", "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2234" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37113" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2234" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2234" } ], "trust": 0.6 } }
var-202112-0240
Vulnerability from variot
There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel crash
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0240", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "NVD", "id": "CVE-2021-37077" } ] }, "cve": "CVE-2021-37077", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37077", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398911", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37077", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37077", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37077", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37077", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2042", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398911", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398911" }, { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "CNNVD", "id": "CNNVD-202109-2042" }, { "db": "NVD", "id": "CVE-2021-37077" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel crash", "sources": [ { "db": "NVD", "id": "CVE-2021-37077" }, { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "VULHUB", "id": "VHN-398911" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37077", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015953", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2042", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398911", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398911" }, { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "CNNVD", "id": "CNNVD-202109-2042" }, { "db": "NVD", "id": "CVE-2021-37077" } ] }, "id": "VAR-202112-0240", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398911" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:27:33.703000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173516" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "CNNVD", "id": "CNNVD-202109-2042" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398911" }, { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "NVD", "id": "CVE-2021-37077" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37077" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398911" }, { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "CNNVD", "id": "CNNVD-202109-2042" }, { "db": "NVD", "id": "CVE-2021-37077" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398911" }, { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "CNNVD", "id": "CNNVD-202109-2042" }, { "db": "NVD", "id": "CVE-2021-37077" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398911" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2042" }, { "date": "2021-12-07T17:15:09.183000", "db": "NVD", "id": "CVE-2021-37077" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398911" }, { "date": "2022-12-05T02:18:00", "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2042" }, { "date": "2021-12-09T17:36:20.790000", "db": "NVD", "id": "CVE-2021-37077" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2042" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 in smartphone \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015953" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2042" } ], "trust": 0.6 } }
var-202212-0421
Vulnerability from variot
Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause privilege escalation, which results in system service exceptions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0421", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46327" } ] }, "cve": "CVE-2022-46327", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-46327", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46327", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2511", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2511" }, { "db": "NVD", "id": "CVE-2022-46327" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause privilege escalation, which results in system service exceptions", "sources": [ { "db": "NVD", "id": "CVE-2022-46327" }, { "db": "VULHUB", "id": "VHN-444297" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46327", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202212-2511", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444297", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444297" }, { "db": "CNNVD", "id": "CNNVD-202212-2511" }, { "db": "NVD", "id": "CVE-2022-46327" } ] }, "id": "VAR-202212-0421", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444297" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:42:15.025000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218958" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46327" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46327/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444297" }, { "db": "CNNVD", "id": "CNNVD-202212-2511" }, { "db": "NVD", "id": "CVE-2022-46327" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444297" }, { "db": "CNNVD", "id": "CNNVD-202212-2511" }, { "db": "NVD", "id": "CVE-2022-46327" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444297" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2511" }, { "date": "2022-12-20T21:15:11.987000", "db": "NVD", "id": "CVE-2022-46327" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444297" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2511" }, { "date": "2022-12-24T04:16:53.907000", "db": "NVD", "id": "CVE-2022-46327" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2511" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2511" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2511" } ], "trust": 0.6 } }
var-202110-1868
Vulnerability from variot
Hilinksvc has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause denial of service attacks. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1868", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "NVD", "id": "CVE-2021-39975" } ] }, "cve": "CVE-2021-39975", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-39975", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401376", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-39975", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39975", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39975", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39975", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2213", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401376", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401376" }, { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "CNNVD", "id": "CNNVD-202110-2213" }, { "db": "NVD", "id": "CVE-2021-39975" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Hilinksvc has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause denial of service attacks. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-39975" }, { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "VULHUB", "id": "VHN-401376" }, { "db": "VULMON", "id": "CVE-2021-39975" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39975", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017596", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2213", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401376", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39975", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401376" }, { "db": "VULMON", "id": "CVE-2021-39975" }, { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "CNNVD", "id": "CNNVD-202110-2213" }, { "db": "NVD", "id": "CVE-2021-39975" } ] }, "id": "VAR-202110-1868", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401376" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:50:05.304000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176761" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "CNNVD", "id": "CNNVD-202110-2213" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "NVD", "id": "CVE-2021-39975" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39975" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401376" }, { "db": "VULMON", "id": "CVE-2021-39975" }, { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "CNNVD", "id": "CNNVD-202110-2213" }, { "db": "NVD", "id": "CVE-2021-39975" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401376" }, { "db": "VULMON", "id": "CVE-2021-39975" }, { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "CNNVD", "id": "CNNVD-202110-2213" }, { "db": "NVD", "id": "CVE-2021-39975" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401376" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39975" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2213" }, { "date": "2022-01-03T22:15:10.380000", "db": "NVD", "id": "CVE-2021-39975" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401376" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39975" }, { "date": "2023-01-27T06:34:00", "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2213" }, { "date": "2022-01-13T16:02:44.597000", "db": "NVD", "id": "CVE-2021-39975" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2213" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017596" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2213" } ], "trust": 0.6 } }
var-202212-0768
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0768", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "NVD", "id": "CVE-2022-46324" } ] }, "cve": "CVE-2022-46324", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-46324", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46324", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46324", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-46324", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202212-2520", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "CNNVD", "id": "CNNVD-202212-2520" }, { "db": "NVD", "id": "CVE-2022-46324" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46324" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "VULHUB", "id": "VHN-444294" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46324", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024019", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2520", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444294", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444294" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "CNNVD", "id": "CNNVD-202212-2520" }, { "db": "NVD", "id": "CVE-2022-46324" } ] }, "id": "VAR-202212-0768", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444294" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:22.299000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218961" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444294" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "NVD", "id": "CVE-2022-46324" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46324" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46324/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444294" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "CNNVD", "id": "CNNVD-202212-2520" }, { "db": "NVD", "id": "CVE-2022-46324" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444294" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "CNNVD", "id": "CNNVD-202212-2520" }, { "db": "NVD", "id": "CVE-2022-46324" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444294" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2520" }, { "date": "2022-12-20T21:15:11.837000", "db": "NVD", "id": "CVE-2022-46324" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444294" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2520" }, { "date": "2022-12-24T04:17:48.310000", "db": "NVD", "id": "CVE-2022-46324" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2520" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024019" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2520" } ], "trust": 0.6 } }
var-202302-0455
Vulnerability from variot
The geofencing kernel code has a vulnerability of not verifying the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access. EMUI and HarmonyOS contains a vulnerability related to improper validation of quantities specified in inputs.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0455", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "NVD", "id": "CVE-2022-48297" } ] }, "cve": "CVE-2022-48297", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-48297", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48297", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48297", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-48297", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202302-351", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "CNNVD", "id": "CNNVD-202302-351" }, { "db": "NVD", "id": "CVE-2022-48297" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The geofencing kernel code has a vulnerability of not verifying the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access. EMUI and HarmonyOS contains a vulnerability related to improper validation of quantities specified in inputs.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48297" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "VULHUB", "id": "VHN-453377" }, { "db": "VULMON", "id": "CVE-2022-48297" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48297", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003380", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-351", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453377", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48297", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453377" }, { "db": "VULMON", "id": "CVE-2022-48297" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "CNNVD", "id": "CNNVD-202302-351" }, { "db": "NVD", "id": "CVE-2022-48297" } ] }, "id": "VAR-202302-0455", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453377" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:15.624000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225752" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-1284", "trust": 1.0 }, { "problemtype": "Improper validation of quantity specified in input (CWE-1284) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453377" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "NVD", "id": "CVE-2022-48297" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48297" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48297/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453377" }, { "db": "VULMON", "id": "CVE-2022-48297" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "CNNVD", "id": "CNNVD-202302-351" }, { "db": "NVD", "id": "CVE-2022-48297" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453377" }, { "db": "VULMON", "id": "CVE-2022-48297" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "CNNVD", "id": "CNNVD-202302-351" }, { "db": "NVD", "id": "CVE-2022-48297" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453377" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48297" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-351" }, { "date": "2023-02-09T17:15:14.490000", "db": "NVD", "id": "CVE-2022-48297" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453377" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48297" }, { "date": "2023-09-07T01:53:00", "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-351" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-48297" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-351" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Validation of Quantities Specified in Inputs in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003380" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-351" } ], "trust": 0.6 } }
var-202109-1958
Vulnerability from variot
The interface of a certain HarmonyOS module has an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to heap memory overflow. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1958", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "NVD", "id": "CVE-2021-22480" } ] }, "cve": "CVE-2021-22480", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22480", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380915", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-22480", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22480", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22480", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-22480", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2054", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380915", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380915" }, { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "CNNVD", "id": "CNNVD-202109-2054" }, { "db": "NVD", "id": "CVE-2021-22480" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The interface of a certain HarmonyOS module has an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to heap memory overflow. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22480" }, { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "VULHUB", "id": "VHN-380915" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22480", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018972", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2054", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380915", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380915" }, { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "CNNVD", "id": "CNNVD-202109-2054" }, { "db": "NVD", "id": "CVE-2021-22480" } ] }, "id": "VAR-202109-1958", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380915" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:50:06.540000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171912" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "CNNVD", "id": "CNNVD-202109-2054" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380915" }, { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "NVD", "id": "CVE-2021-22480" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22480" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22480/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380915" }, { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "CNNVD", "id": "CNNVD-202109-2054" }, { "db": "NVD", "id": "CVE-2021-22480" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380915" }, { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "CNNVD", "id": "CNNVD-202109-2054" }, { "db": "NVD", "id": "CVE-2021-22480" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380915" }, { "date": "2023-07-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2054" }, { "date": "2022-02-25T19:15:11.207000", "db": "NVD", "id": "CVE-2021-22480" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-08T00:00:00", "db": "VULHUB", "id": "VHN-380915" }, { "date": "2023-07-12T07:27:00", "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2054" }, { "date": "2022-03-08T13:51:37.170000", "db": "NVD", "id": "CVE-2021-22480" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2054" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018972" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2054" } ], "trust": 0.6 } }
var-202210-0400
Vulnerability from variot
The communication framework module has a vulnerability of not truncating data properly.Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0400", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41586" } ] }, "cve": "CVE-2022-41586", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-41586", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41586", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-163", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-163" }, { "db": "NVD", "id": "CVE-2022-41586" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The communication framework module has a vulnerability of not truncating data properly.Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-41586" }, { "db": "VULHUB", "id": "VHN-437819" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41586", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-163", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437819", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437819" }, { "db": "CNNVD", "id": "CNNVD-202210-163" }, { "db": "NVD", "id": "CVE-2022-41586" } ] }, "id": "VAR-202210-0400", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437819" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:21:36.874000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211147" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41586" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41586/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437819" }, { "db": "CNNVD", "id": "CNNVD-202210-163" }, { "db": "NVD", "id": "CVE-2022-41586" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437819" }, { "db": "CNNVD", "id": "CNNVD-202210-163" }, { "db": "NVD", "id": "CVE-2022-41586" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437819" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-163" }, { "date": "2022-10-14T16:15:24.217000", "db": "NVD", "id": "CVE-2022-41586" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437819" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-163" }, { "date": "2022-10-18T17:15:43.630000", "db": "NVD", "id": "CVE-2022-41586" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-163" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-163" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-163" } ], "trust": 0.6 } }
var-202111-0875
Vulnerability from variot
There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0875", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "NVD", "id": "CVE-2021-37018" } ] }, "cve": "CVE-2021-37018", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37018", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398850", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37018", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37018", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37018", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37018", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1886", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398850", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398850" }, { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "CNNVD", "id": "CNNVD-202111-1886" }, { "db": "NVD", "id": "CVE-2021-37018" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android", "sources": [ { "db": "NVD", "id": "CVE-2021-37018" }, { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "VULHUB", "id": "VHN-398850" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37018", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015581", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1886", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102854", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398850", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398850" }, { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "CNNVD", "id": "CNNVD-202111-1886" }, { "db": "NVD", "id": "CVE-2021-37018" } ] }, "id": "VAR-202111-0875", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398850" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:55:45.537000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172185" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "CNNVD", "id": "CNNVD-202111-1886" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "NVD", "id": "CVE-2021-37018" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37018" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398850" }, { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "CNNVD", "id": "CNNVD-202111-1886" }, { "db": "NVD", "id": "CVE-2021-37018" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398850" }, { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "CNNVD", "id": "CNNVD-202111-1886" }, { "db": "NVD", "id": "CVE-2021-37018" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398850" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1886" }, { "date": "2021-11-23T16:15:09.367000", "db": "NVD", "id": "CVE-2021-37018" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398850" }, { "date": "2022-11-24T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1886" }, { "date": "2021-11-29T18:59:42.433000", "db": "NVD", "id": "CVE-2021-37018" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1886" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015581" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1886" } ], "trust": 0.6 } }
var-202111-1770
Vulnerability from variot
There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource disclosure vulnerability to the wrong area.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1770", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" } ] }, "cve": "CVE-2021-39969", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-39969", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401370", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-39969", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39969", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39969", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39969", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-2130", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401370", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-39969", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" }, { "db": "NVD", "id": "CVE-2021-39969" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource disclosure vulnerability to the wrong area.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39969", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017612", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2130", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401370", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39969", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" }, { "db": "NVD", "id": "CVE-2021-39969" } ] }, "id": "VAR-202111-1770", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401370" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:25:07.239000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176791" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39969" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/668.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" }, { "db": "NVD", "id": "CVE-2021-39969" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" }, { "db": "NVD", "id": "CVE-2021-39969" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401370" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39969" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2130" }, { "date": "2022-01-03T22:15:10.093000", "db": "NVD", "id": "CVE-2021-39969" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401370" }, { "date": "2022-01-13T00:00:00", "db": "VULMON", "id": "CVE-2021-39969" }, { "date": "2023-01-27T07:14:00", "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2130" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-39969" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2130" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to resource leakage to the wrong area in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017612" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2130" } ], "trust": 0.6 } }
var-202110-1442
Vulnerability from variot
A component of the HarmonyOS has a Incomplete Cleanup vulnerability. Local attackers may exploit this vulnerability to cause memory exhaustion. HarmonyOS contains an incomplete cleanup vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1442", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "NVD", "id": "CVE-2021-22450" } ] }, "cve": "CVE-2021-22450", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22450", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380885", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22450", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22450", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22450", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22450", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2040", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380885", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380885" }, { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "CNNVD", "id": "CNNVD-202110-2040" }, { "db": "NVD", "id": "CVE-2021-22450" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Incomplete Cleanup vulnerability. Local attackers may exploit this vulnerability to cause memory exhaustion. HarmonyOS contains an incomplete cleanup vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22450" }, { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "VULHUB", "id": "VHN-380885" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22450", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014240", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2040", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380885", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380885" }, { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "CNNVD", "id": "CNNVD-202110-2040" }, { "db": "NVD", "id": "CVE-2021-22450" } ] }, "id": "VAR-202110-1442", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380885" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:32.352000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=168085" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "CNNVD", "id": "CNNVD-202110-2040" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-459", "trust": 1.1 }, { "problemtype": "incomplete cleanup (CWE-459) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380885" }, { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "NVD", "id": "CVE-2021-22450" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22450" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380885" }, { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "CNNVD", "id": "CNNVD-202110-2040" }, { "db": "NVD", "id": "CVE-2021-22450" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380885" }, { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "CNNVD", "id": "CNNVD-202110-2040" }, { "db": "NVD", "id": "CVE-2021-22450" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380885" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2040" }, { "date": "2021-10-28T13:15:08.813000", "db": "NVD", "id": "CVE-2021-22450" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380885" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2040" }, { "date": "2021-11-01T18:53:09.997000", "db": "NVD", "id": "CVE-2021-22450" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2040" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Incomplete Cleanup Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014240" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2040" } ], "trust": 0.6 } }
var-202111-0883
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0883", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "NVD", "id": "CVE-2021-37004" } ] }, "cve": "CVE-2021-37004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37004", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398835", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37004", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37004", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37004", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37004", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1877", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398835", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398835" }, { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "CNNVD", "id": "CNNVD-202111-1877" }, { "db": "NVD", "id": "CVE-2021-37004" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37004" }, { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "VULHUB", "id": "VHN-398835" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37004", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015635", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1877", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398835", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398835" }, { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "CNNVD", "id": "CNNVD-202111-1877" }, { "db": "NVD", "id": "CVE-2021-37004" } ] }, "id": "VAR-202111-0883", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398835" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:25:07.930000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172176" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "CNNVD", "id": "CNNVD-202111-1877" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398835" }, { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "NVD", "id": "CVE-2021-37004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37004" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398835" }, { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "CNNVD", "id": "CNNVD-202111-1877" }, { "db": "NVD", "id": "CVE-2021-37004" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398835" }, { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "CNNVD", "id": "CNNVD-202111-1877" }, { "db": "NVD", "id": "CVE-2021-37004" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398835" }, { "date": "2022-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1877" }, { "date": "2021-11-23T16:15:08.847000", "db": "NVD", "id": "CVE-2021-37004" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398835" }, { "date": "2022-11-28T04:59:00", "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1877" }, { "date": "2021-11-29T16:05:11.830000", "db": "NVD", "id": "CVE-2021-37004" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1877" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015635" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1877" } ], "trust": 0.6 } }
var-202111-1763
Vulnerability from variot
The HwNearbyMain module has a Improper Handling of Exceptional Conditions vulnerability.Successful exploitation of this vulnerability may lead to message leak. HarmonyOS Exists in a vulnerability in handling exceptional conditions.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS Vision HwNearbyMain. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1763", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "NVD", "id": "CVE-2021-37118" } ] }, "cve": "CVE-2021-37118", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37118", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398954", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2021-37118", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37118", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37118", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-37118", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202111-2137", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398954", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398954" }, { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "CNNVD", "id": "CNNVD-202111-2137" }, { "db": "NVD", "id": "CVE-2021-37118" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwNearbyMain module has a Improper Handling of Exceptional Conditions vulnerability.Successful exploitation of this vulnerability may lead to message leak. HarmonyOS Exists in a vulnerability in handling exceptional conditions.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS Vision HwNearbyMain. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37118" }, { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "VULHUB", "id": "VHN-398954" }, { "db": "VULMON", "id": "CVE-2021-37118" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37118", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017300", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2137", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08318", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398954", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37118", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398954" }, { "db": "VULMON", "id": "CVE-2021-37118" }, { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "CNNVD", "id": "CNNVD-202111-2137" }, { "db": "NVD", "id": "CVE-2021-37118" } ] }, "id": "VAR-202111-1763", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398954" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:22:03.041000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176798" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "CNNVD", "id": "CNNVD-202111-2137" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-755", "trust": 1.1 }, { "problemtype": "Improper handling in exceptional conditions (CWE-755) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398954" }, { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "NVD", "id": "CVE-2021-37118" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37118" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202111-0000001172249896" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398954" }, { "db": "VULMON", "id": "CVE-2021-37118" }, { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "CNNVD", "id": "CNNVD-202111-2137" }, { "db": "NVD", "id": "CVE-2021-37118" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398954" }, { "db": "VULMON", "id": "CVE-2021-37118" }, { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "CNNVD", "id": "CNNVD-202111-2137" }, { "db": "NVD", "id": "CVE-2021-37118" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398954" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37118" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2137" }, { "date": "2022-01-03T22:15:09.400000", "db": "NVD", "id": "CVE-2021-37118" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398954" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37118" }, { "date": "2023-01-13T06:22:00", "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2137" }, { "date": "2022-01-11T19:52:56", "db": "NVD", "id": "CVE-2021-37118" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2137" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in handling exceptional conditions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017300" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2137" } ], "trust": 0.6 } }
var-202212-0382
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0382", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "NVD", "id": "CVE-2022-46325" } ] }, "cve": "CVE-2022-46325", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-46325", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46325", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46325", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-46325", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202212-2514", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "CNNVD", "id": "CNNVD-202212-2514" }, { "db": "NVD", "id": "CVE-2022-46325" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46325" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "VULHUB", "id": "VHN-444295" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46325", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024018", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2514", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444295", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444295" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "CNNVD", "id": "CNNVD-202212-2514" }, { "db": "NVD", "id": "CVE-2022-46325" } ] }, "id": "VAR-202212-0382", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444295" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:21.108000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218960" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444295" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "NVD", "id": "CVE-2022-46325" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46325" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46325/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444295" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "CNNVD", "id": "CNNVD-202212-2514" }, { "db": "NVD", "id": "CVE-2022-46325" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444295" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "CNNVD", "id": "CNNVD-202212-2514" }, { "db": "NVD", "id": "CVE-2022-46325" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444295" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2514" }, { "date": "2022-12-20T21:15:11.887000", "db": "NVD", "id": "CVE-2022-46325" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444295" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2514" }, { "date": "2022-12-24T04:17:17.677000", "db": "NVD", "id": "CVE-2022-46325" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2514" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024018" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2514" } ], "trust": 0.6 } }
var-202112-0241
Vulnerability from variot
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0241", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "NVD", "id": "CVE-2021-37076" } ] }, "cve": "CVE-2021-37076", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37076", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398910", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37076", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37076", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37076", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37076", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2010", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398910", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398910" }, { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "CNNVD", "id": "CNNVD-202109-2010" }, { "db": "NVD", "id": "CVE-2021-37076" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37076" }, { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "VULHUB", "id": "VHN-398910" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37076", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015956", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2010", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398910", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398910" }, { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "CNNVD", "id": "CNNVD-202109-2010" }, { "db": "NVD", "id": "CVE-2021-37076" } ] }, "id": "VAR-202112-0241", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398910" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:22:02.834000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173489" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "CNNVD", "id": "CNNVD-202109-2010" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398910" }, { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "NVD", "id": "CVE-2021-37076" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37076" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398910" }, { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "CNNVD", "id": "CNNVD-202109-2010" }, { "db": "NVD", "id": "CVE-2021-37076" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398910" }, { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "CNNVD", "id": "CNNVD-202109-2010" }, { "db": "NVD", "id": "CVE-2021-37076" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398910" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2010" }, { "date": "2021-12-07T17:15:09.137000", "db": "NVD", "id": "CVE-2021-37076" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398910" }, { "date": "2022-12-05T02:34:00", "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2010" }, { "date": "2021-12-09T17:36:31.383000", "db": "NVD", "id": "CVE-2021-37076" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2010" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015956" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2010" } ], "trust": 0.6 } }
var-202210-0177
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0177", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "NVD", "id": "CVE-2022-41594" } ] }, "cve": "CVE-2022-41594", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "id": "CVE-2022-41594", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41594", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41594", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2022-41594", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202210-156", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "CNNVD", "id": "CNNVD-202210-156" }, { "db": "NVD", "id": "CVE-2022-41594" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41594" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "VULHUB", "id": "VHN-437833" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41594", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018792", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-156", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437833", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437833" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "CNNVD", "id": "CNNVD-202210-156" }, { "db": "NVD", "id": "CVE-2022-41594" } ] }, "id": "VAR-202210-0177", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437833" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:30:57.962000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210790" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437833" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "NVD", "id": "CVE-2022-41594" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41594" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41594/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437833" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "CNNVD", "id": "CNNVD-202210-156" }, { "db": "NVD", "id": "CVE-2022-41594" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437833" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "CNNVD", "id": "CNNVD-202210-156" }, { "db": "NVD", "id": "CVE-2022-41594" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437833" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-156" }, { "date": "2022-10-14T16:15:27.057000", "db": "NVD", "id": "CVE-2022-41594" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437833" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-156" }, { "date": "2022-10-15T01:54:40.460000", "db": "NVD", "id": "CVE-2022-41594" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-156" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018792" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-156" } ], "trust": 0.6 } }
var-202112-0247
Vulnerability from variot
There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality impacted. Huawei Smartphones are vulnerable to information disclosure.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0247", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "NVD", "id": "CVE-2021-37067" } ] }, "cve": "CVE-2021-37067", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37067", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398901", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37067", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37067", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37067", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37067", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2012", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398901", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398901" }, { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "CNNVD", "id": "CNNVD-202109-2012" }, { "db": "NVD", "id": "CVE-2021-37067" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality impacted. Huawei Smartphones are vulnerable to information disclosure.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37067" }, { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "VULHUB", "id": "VHN-398901" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37067", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015982", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2012", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398901", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398901" }, { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "CNNVD", "id": "CNNVD-202109-2012" }, { "db": "NVD", "id": "CVE-2021-37067" } ] }, "id": "VAR-202112-0247", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398901" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:02:55.174000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173491" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "CNNVD", "id": "CNNVD-202109-2012" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 }, { "problemtype": "information leak (CWE-200) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398901" }, { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "NVD", "id": "CVE-2021-37067" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37067" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398901" }, { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "CNNVD", "id": "CNNVD-202109-2012" }, { "db": "NVD", "id": "CVE-2021-37067" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398901" }, { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "CNNVD", "id": "CNNVD-202109-2012" }, { "db": "NVD", "id": "CVE-2021-37067" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398901" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2012" }, { "date": "2021-12-07T17:15:08.883000", "db": "NVD", "id": "CVE-2021-37067" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398901" }, { "date": "2022-12-05T03:12:00", "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2012" }, { "date": "2021-12-09T17:38:10.913000", "db": "NVD", "id": "CVE-2021-37067" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2012" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Information disclosure vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015982" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2012" } ], "trust": 0.6 } }
var-202111-0872
Vulnerability from variot
There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause media files which can be reads and writes in non-distributed directories on any device on the network.. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0872", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "NVD", "id": "CVE-2021-37023" } ] }, "cve": "CVE-2021-37023", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37023", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398856", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2021-37023", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37023", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37023", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-37023", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202111-1911", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398856", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398856" }, { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "CNNVD", "id": "CNNVD-202111-1911" }, { "db": "NVD", "id": "CVE-2021-37023" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause media files which can be reads and writes in non-distributed directories on any device on the network.. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-37023" }, { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "VULHUB", "id": "VHN-398856" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37023", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015565", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1911", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398856", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398856" }, { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "CNNVD", "id": "CNNVD-202111-1911" }, { "db": "NVD", "id": "CVE-2021-37023" } ] }, "id": "VAR-202111-0872", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398856" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:42:42.340000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172199" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "CNNVD", "id": "CNNVD-202111-1911" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398856" }, { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "NVD", "id": "CVE-2021-37023" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37023" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398856" }, { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "CNNVD", "id": "CNNVD-202111-1911" }, { "db": "NVD", "id": "CVE-2021-37023" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398856" }, { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "CNNVD", "id": "CNNVD-202111-1911" }, { "db": "NVD", "id": "CVE-2021-37023" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398856" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1911" }, { "date": "2021-11-23T16:15:09.500000", "db": "NVD", "id": "CVE-2021-37023" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-398856" }, { "date": "2022-11-24T07:09:00", "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1911" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-37023" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1911" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Path Traversal Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015565" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1911" } ], "trust": 0.6 } }
var-202112-0239
Vulnerability from variot
There is a Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote Denial of Service. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0239", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "NVD", "id": "CVE-2021-37078" } ] }, "cve": "CVE-2021-37078", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37078", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398912", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37078", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37078", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37078", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37078", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2009", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398912", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398912" }, { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "CNNVD", "id": "CNNVD-202109-2009" }, { "db": "NVD", "id": "CVE-2021-37078" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote Denial of Service. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37078" }, { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "VULHUB", "id": "VHN-398912" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37078", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015952", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2009", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398912", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398912" }, { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "CNNVD", "id": "CNNVD-202109-2009" }, { "db": "NVD", "id": "CVE-2021-37078" } ] }, "id": "VAR-202112-0239", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398912" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:57.112000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173488" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "CNNVD", "id": "CNNVD-202109-2009" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-755", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "NVD", "id": "CVE-2021-37078" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37078" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398912" }, { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "CNNVD", "id": "CNNVD-202109-2009" }, { "db": "NVD", "id": "CVE-2021-37078" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398912" }, { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "CNNVD", "id": "CNNVD-202109-2009" }, { "db": "NVD", "id": "CVE-2021-37078" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398912" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2009" }, { "date": "2021-12-07T17:15:09.227000", "db": "NVD", "id": "CVE-2021-37078" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398912" }, { "date": "2022-12-05T02:13:00", "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2009" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37078" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2009" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015952" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2009" } ], "trust": 0.6 } }
var-202209-0253
Vulnerability from variot
The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0253", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" } ] }, "cve": "CVE-2022-39000", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-39000", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39000", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-39000", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-39000", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202209-212", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "CNNVD", "id": "CNNVD-202209-212" }, { "db": "NVD", "id": "CVE-2022-39000" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39000", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017154", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-212", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-81255", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428487", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39000", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "CNNVD", "id": "CNNVD-202209-212" }, { "db": "NVD", "id": "CVE-2022-39000" } ] }, "id": "VAR-202209-0253", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428487" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:55:17.053000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208409" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39000" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39000/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "CNNVD", "id": "CNNVD-202209-212" }, { "db": "NVD", "id": "CVE-2022-39000" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "CNNVD", "id": "CNNVD-202209-212" }, { "db": "NVD", "id": "CVE-2022-39000" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428487" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39000" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-212" }, { "date": "2022-09-16T18:15:17.900000", "db": "NVD", "id": "CVE-2022-39000" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-428487" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39000" }, { "date": "2023-10-11T08:51:00", "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-212" }, { "date": "2022-09-20T19:07:54.390000", "db": "NVD", "id": "CVE-2022-39000" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-212" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-212" } ], "trust": 0.6 } }
var-202112-0253
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to SAMGR Heap Address Leakage. Huawei Smartphones contain a vulnerability related to input validation.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0253", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "NVD", "id": "CVE-2021-37060" } ] }, "cve": "CVE-2021-37060", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37060", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398894", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37060", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37060", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37060", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37060", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2063", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398894", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398894" }, { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "CNNVD", "id": "CNNVD-202109-2063" }, { "db": "NVD", "id": "CVE-2021-37060" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to SAMGR Heap Address Leakage. Huawei Smartphones contain a vulnerability related to input validation.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37060" }, { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "VULHUB", "id": "VHN-398894" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37060", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016046", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2063", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398894", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398894" }, { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "CNNVD", "id": "CNNVD-202109-2063" }, { "db": "NVD", "id": "CVE-2021-37060" } ] }, "id": "VAR-202112-0253", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398894" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:43:08.692000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173529" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "CNNVD", "id": "CNNVD-202109-2063" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398894" }, { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "NVD", "id": "CVE-2021-37060" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37060" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398894" }, { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "CNNVD", "id": "CNNVD-202109-2063" }, { "db": "NVD", "id": "CVE-2021-37060" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398894" }, { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "CNNVD", "id": "CNNVD-202109-2063" }, { "db": "NVD", "id": "CVE-2021-37060" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398894" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2063" }, { "date": "2021-12-07T17:15:08.593000", "db": "NVD", "id": "CVE-2021-37060" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398894" }, { "date": "2022-12-05T07:36:00", "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "date": "2021-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2063" }, { "date": "2021-12-09T17:40:14.807000", "db": "NVD", "id": "CVE-2021-37060" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2063" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016046" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2063" } ], "trust": 0.6 } }
var-202206-0024
Vulnerability from variot
Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HarmonyOS 2.0. The vulnerability is due to the pop-up problem after the lock screen of the USSD service customized by the operator
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0024", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" } ] }, "cve": "CVE-2022-31760", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-31760", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-423593", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-31760", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31760", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-31760", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-31760", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202206-472", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-423593", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31760", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "CNNVD", "id": "CNNVD-202206-472" }, { "db": "NVD", "id": "CVE-2022-31760" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HarmonyOS 2.0. The vulnerability is due to the pop-up problem after the lock screen of the USSD service customized by the operator", "sources": [ { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31760", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012033", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-472", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66176", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423593", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31760", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "CNNVD", "id": "CNNVD-202206-472" }, { "db": "NVD", "id": "CVE-2022-31760" } ] }, "id": "VAR-202206-0024", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423593" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:43.169000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=198079" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31760" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31760/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "CNNVD", "id": "CNNVD-202206-472" }, { "db": "NVD", "id": "CVE-2022-31760" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "CNNVD", "id": "CNNVD-202206-472" }, { "db": "NVD", "id": "CVE-2022-31760" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423593" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31760" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-472" }, { "date": "2022-06-13T16:15:08.770000", "db": "NVD", "id": "CVE-2022-31760" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423593" }, { "date": "2022-06-27T00:00:00", "db": "VULMON", "id": "CVE-2022-31760" }, { "date": "2023-08-25T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-472" }, { "date": "2022-06-27T16:15:59.833000", "db": "NVD", "id": "CVE-2022-31760" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-472" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012033" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-472" } ], "trust": 0.6 } }
var-202111-1768
Vulnerability from variot
There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down. plural Huawei For smartphone products, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1768", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" } ] }, "cve": "CVE-2021-39973", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-39973", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401374", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-39973", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39973", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39973", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39973", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-2132", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401374", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" }, { "db": "NVD", "id": "CVE-2021-39973" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down. plural Huawei For smartphone products, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39973", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017607", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2132", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401374", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39973", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" }, { "db": "NVD", "id": "CVE-2021-39973" } ] }, "id": "VAR-202111-1768", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401374" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:25:07.267000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176793" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39973" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" }, { "db": "NVD", "id": "CVE-2021-39973" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" }, { "db": "NVD", "id": "CVE-2021-39973" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401374" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39973" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2132" }, { "date": "2022-01-03T22:15:10.283000", "db": "NVD", "id": "CVE-2021-39973" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401374" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39973" }, { "date": "2023-01-27T06:59:00", "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2132" }, { "date": "2022-01-13T15:52:06.580000", "db": "NVD", "id": "CVE-2021-39973" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2132" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 in smartphone products \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017607" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2132" } ], "trust": 0.6 } }
var-202301-0724
Vulnerability from variot
The memory management module has a logic bypass vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0724", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "NVD", "id": "CVE-2022-46762" } ] }, "cve": "CVE-2022-46762", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-46762", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46762", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46762", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-46762", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202301-437", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "CNNVD", "id": "CNNVD-202301-437" }, { "db": "NVD", "id": "CVE-2022-46762" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The memory management module has a logic bypass vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-46762" }, { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "VULHUB", "id": "VHN-447442" }, { "db": "VULMON", "id": "CVE-2022-46762" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46762", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001769", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-437", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-447442", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-46762", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-447442" }, { "db": "VULMON", "id": "CVE-2022-46762" }, { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "CNNVD", "id": "CNNVD-202301-437" }, { "db": "NVD", "id": "CVE-2022-46762" } ] }, "id": "VAR-202301-0724", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-447442" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:04.775000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=221314" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "NVD", "id": "CVE-2022-46762" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46762" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46762/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-447442" }, { "db": "VULMON", "id": "CVE-2022-46762" }, { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "CNNVD", "id": "CNNVD-202301-437" }, { "db": "NVD", "id": "CVE-2022-46762" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-447442" }, { "db": "VULMON", "id": "CVE-2022-46762" }, { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "CNNVD", "id": "CNNVD-202301-437" }, { "db": "NVD", "id": "CVE-2022-46762" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-447442" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-46762" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-437" }, { "date": "2023-01-06T20:15:09.773000", "db": "NVD", "id": "CVE-2022-46762" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-447442" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-46762" }, { "date": "2023-05-09T01:48:00", "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-437" }, { "date": "2023-01-12T17:15:36.043000", "db": "NVD", "id": "CVE-2022-46762" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-437" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-437" } ], "trust": 0.6 } }
var-202302-0316
Vulnerability from variot
The bundle management module lacks permission verification in some APIs. Successful exploitation of this vulnerability may restore the pre-installed apps that have been uninstalled. EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0316", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "NVD", "id": "CVE-2022-48301" } ] }, "cve": "CVE-2022-48301", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-48301", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-48301", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48301", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-48301", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202302-342", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "CNNVD", "id": "CNNVD-202302-342" }, { "db": "NVD", "id": "CVE-2022-48301" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bundle management module lacks permission verification in some APIs. Successful exploitation of this vulnerability may restore the pre-installed apps that have been uninstalled. EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-48301" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "VULHUB", "id": "VHN-453381" }, { "db": "VULMON", "id": "CVE-2022-48301" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48301", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003613", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-342", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453381", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48301", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453381" }, { "db": "VULMON", "id": "CVE-2022-48301" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "CNNVD", "id": "CNNVD-202302-342" }, { "db": "NVD", "id": "CVE-2022-48301" } ] }, "id": "VAR-202302-0316", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453381" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:17.299000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225928" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453381" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "NVD", "id": "CVE-2022-48301" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48301" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48301/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453381" }, { "db": "VULMON", "id": "CVE-2022-48301" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "CNNVD", "id": "CNNVD-202302-342" }, { "db": "NVD", "id": "CVE-2022-48301" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453381" }, { "db": "VULMON", "id": "CVE-2022-48301" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "CNNVD", "id": "CNNVD-202302-342" }, { "db": "NVD", "id": "CVE-2022-48301" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453381" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48301" }, { "date": "2023-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-342" }, { "date": "2023-02-09T17:15:15.343000", "db": "NVD", "id": "CVE-2022-48301" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-17T00:00:00", "db": "VULHUB", "id": "VHN-453381" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48301" }, { "date": "2023-09-14T07:25:00", "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "date": "2023-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-342" }, { "date": "2023-02-17T13:04:34.307000", "db": "NVD", "id": "CVE-2022-48301" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-342" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Permission Preservation Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003613" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-342" } ], "trust": 0.6 } }
var-202209-1094
Vulnerability from variot
Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice. Huawei of EMUI , HarmonyOS , Magic UI contains a double free vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-1094", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" } ] }, "cve": "CVE-2022-39002", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-39002", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39002", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-39002", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-39002", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202209-1277", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" }, { "db": "NVD", "id": "CVE-2022-39002" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice. Huawei of EMUI , HarmonyOS , Magic UI contains a double free vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39002", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017592", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-1277", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434773", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39002", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" }, { "db": "NVD", "id": "CVE-2022-39002" } ] }, "id": "VAR-202209-1094", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434773" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:02.593000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=209481" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39002" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39002/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" }, { "db": "NVD", "id": "CVE-2022-39002" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" }, { "db": "NVD", "id": "CVE-2022-39002" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434773" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39002" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "date": "2022-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1277" }, { "date": "2022-09-16T18:15:17.977000", "db": "NVD", "id": "CVE-2022-39002" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-03T00:00:00", "db": "VULHUB", "id": "VHN-434773" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39002" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1277" }, { "date": "2022-11-03T20:43:29.643000", "db": "NVD", "id": "CVE-2022-39002" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1277" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product double free vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017592" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1277" } ], "trust": 0.6 } }
var-202205-0439
Vulnerability from variot
The Property module has a vulnerability in permission control.This vulnerability can be exploited to obtain the unique device identifier. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0439", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "NVD", "id": "CVE-2021-46785" } ] }, "cve": "CVE-2021-46785", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-46785", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-419297", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2021-46785", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-46785", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46785", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-46785", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202205-2544", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-419297", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419297" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "CNNVD", "id": "CNNVD-202205-2544" }, { "db": "NVD", "id": "CVE-2021-46785" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Property module has a vulnerability in permission control.This vulnerability can be exploited to obtain the unique device identifier. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-46785" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "VULHUB", "id": "VHN-419297" }, { "db": "VULMON", "id": "CVE-2021-46785" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46785", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009695", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2544", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-41788", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-419297", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46785", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419297" }, { "db": "VULMON", "id": "CVE-2021-46785" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "CNNVD", "id": "CNNVD-202205-2544" }, { "db": "NVD", "id": "CVE-2021-46785" } ] }, "id": "VAR-202205-0439", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419297" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:50.267000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=192868" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "NVD", "id": "CVE-2021-46785" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46785" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46785/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419297" }, { "db": "VULMON", "id": "CVE-2021-46785" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "CNNVD", "id": "CNNVD-202205-2544" }, { "db": "NVD", "id": "CVE-2021-46785" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419297" }, { "db": "VULMON", "id": "CVE-2021-46785" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "CNNVD", "id": "CNNVD-202205-2544" }, { "db": "NVD", "id": "CVE-2021-46785" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419297" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46785" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2544" }, { "date": "2022-05-13T15:15:08.410000", "db": "NVD", "id": "CVE-2021-46785" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-419297" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46785" }, { "date": "2023-08-07T08:16:00", "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2544" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-46785" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2544" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009695" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2544" } ], "trust": 0.6 } }
var-202110-1454
Vulnerability from variot
A component of the HarmonyOS has a Heap-based Buffer Overflow vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable. HarmonyOS Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1454", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "NVD", "id": "CVE-2021-22465" } ] }, "cve": "CVE-2021-22465", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22465", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380900", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22465", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22465", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22465", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22465", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2057", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380900", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380900" }, { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "CNNVD", "id": "CNNVD-202110-2057" }, { "db": "NVD", "id": "CVE-2021-22465" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Heap-based Buffer Overflow vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable. HarmonyOS Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22465" }, { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "VULHUB", "id": "VHN-380900" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22465", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014248", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2057", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380900", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380900" }, { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "CNNVD", "id": "CNNVD-202110-2057" }, { "db": "NVD", "id": "CVE-2021-22465" } ] }, "id": "VAR-202110-1454", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380900" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:23:14.205000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171517" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "CNNVD", "id": "CNNVD-202110-2057" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-120", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380900" }, { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "NVD", "id": "CVE-2021-22465" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22465" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380900" }, { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "CNNVD", "id": "CNNVD-202110-2057" }, { "db": "NVD", "id": "CVE-2021-22465" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380900" }, { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "CNNVD", "id": "CNNVD-202110-2057" }, { "db": "NVD", "id": "CVE-2021-22465" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380900" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2057" }, { "date": "2021-10-28T13:15:09.453000", "db": "NVD", "id": "CVE-2021-22465" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-380900" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "date": "2022-05-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2057" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-22465" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2057" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014248" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2057" } ], "trust": 0.6 } }
var-202112-0243
Vulnerability from variot
There is a Incorrect Calculation of Buffer Size vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory crash. Huawei Smartphones have a double free vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0243", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "NVD", "id": "CVE-2021-37072" } ] }, "cve": "CVE-2021-37072", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37072", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398906", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37072", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37072", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37072", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37072", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2043", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398906", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398906" }, { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "CNNVD", "id": "CNNVD-202109-2043" }, { "db": "NVD", "id": "CVE-2021-37072" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Incorrect Calculation of Buffer Size vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory crash. Huawei Smartphones have a double free vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37072" }, { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "VULHUB", "id": "VHN-398906" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37072", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015961", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2043", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398906", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398906" }, { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "CNNVD", "id": "CNNVD-202109-2043" }, { "db": "NVD", "id": "CVE-2021-37072" } ] }, "id": "VAR-202112-0243", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398906" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:01:15.793000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173517" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "CNNVD", "id": "CNNVD-202109-2043" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398906" }, { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "NVD", "id": "CVE-2021-37072" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37072" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398906" }, { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "CNNVD", "id": "CNNVD-202109-2043" }, { "db": "NVD", "id": "CVE-2021-37072" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398906" }, { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "CNNVD", "id": "CNNVD-202109-2043" }, { "db": "NVD", "id": "CVE-2021-37072" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398906" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2043" }, { "date": "2021-12-07T17:15:09.050000", "db": "NVD", "id": "CVE-2021-37072" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-15T00:00:00", "db": "VULHUB", "id": "VHN-398906" }, { "date": "2022-12-05T02:46:00", "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2043" }, { "date": "2021-12-15T13:42:55.633000", "db": "NVD", "id": "CVE-2021-37072" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2043" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Double free vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015961" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2043" } ], "trust": 0.6 } }
var-202110-1448
Vulnerability from variot
A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1448", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "NVD", "id": "CVE-2021-22471" } ] }, "cve": "CVE-2021-22471", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22471", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380906", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22471", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22471", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22471", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22471", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2065", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380906", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380906" }, { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "CNNVD", "id": "CNNVD-202110-2065" }, { "db": "NVD", "id": "CVE-2021-22471" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash", "sources": [ { "db": "NVD", "id": "CVE-2021-22471" }, { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "VULHUB", "id": "VHN-380906" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22471", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014254", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2065", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380906", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380906" }, { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "CNNVD", "id": "CNNVD-202110-2065" }, { "db": "NVD", "id": "CVE-2021-22471" } ] }, "id": "VAR-202110-1448", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380906" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:11:12.619000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171547" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "CNNVD", "id": "CNNVD-202110-2065" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380906" }, { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "NVD", "id": "CVE-2021-22471" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22471" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380906" }, { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "CNNVD", "id": "CNNVD-202110-2065" }, { "db": "NVD", "id": "CVE-2021-22471" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380906" }, { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "CNNVD", "id": "CNNVD-202110-2065" }, { "db": "NVD", "id": "CVE-2021-22471" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380906" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2065" }, { "date": "2021-10-28T13:15:09.703000", "db": "NVD", "id": "CVE-2021-22471" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380906" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2065" }, { "date": "2021-11-01T19:14:57.820000", "db": "NVD", "id": "CVE-2021-22471" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2065" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014254" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2065" } ], "trust": 0.6 } }
var-202107-1679
Vulnerability from variot
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1679", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" } ] }, "cve": "CVE-2021-22426", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22426", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380861", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-22426", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22426", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22426", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-22426", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202107-2226", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380861", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" }, { "db": "NVD", "id": "CVE-2021-22426" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "VULHUB", "id": "VHN-380861" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22426", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018585", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2226", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380861", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" }, { "db": "NVD", "id": "CVE-2021-22426" } ] }, "id": "VAR-202107-1679", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380861" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:42:50.927000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202107-0000001170634565 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172003" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22426" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22426/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" }, { "db": "NVD", "id": "CVE-2021-22426" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" }, { "db": "NVD", "id": "CVE-2021-22426" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380861" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2226" }, { "date": "2022-02-25T19:15:09.207000", "db": "NVD", "id": "CVE-2021-22426" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380861" }, { "date": "2023-06-30T08:24:00", "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2226" }, { "date": "2022-03-07T17:50:39.693000", "db": "NVD", "id": "CVE-2021-22426" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2226" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018585" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2226" } ], "trust": 0.6 } }
var-202210-0320
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0320", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "NVD", "id": "CVE-2022-41601" } ] }, "cve": "CVE-2022-41601", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "id": "CVE-2022-41601", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41601", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41601", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2022-41601", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202210-151", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "CNNVD", "id": "CNNVD-202210-151" }, { "db": "NVD", "id": "CVE-2022-41601" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41601" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "VULHUB", "id": "VHN-437848" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41601", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018787", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-151", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437848", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437848" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "CNNVD", "id": "CNNVD-202210-151" }, { "db": "NVD", "id": "CVE-2022-41601" } ] }, "id": "VAR-202210-0320", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437848" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:21.317000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210785" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437848" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "NVD", "id": "CVE-2022-41601" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41601" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41601/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437848" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "CNNVD", "id": "CNNVD-202210-151" }, { "db": "NVD", "id": "CVE-2022-41601" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437848" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "CNNVD", "id": "CNNVD-202210-151" }, { "db": "NVD", "id": "CVE-2022-41601" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437848" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-151" }, { "date": "2022-10-14T16:15:29.460000", "db": "NVD", "id": "CVE-2022-41601" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437848" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-151" }, { "date": "2022-10-15T01:57:37.013000", "db": "NVD", "id": "CVE-2022-41601" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-151" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018787" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-151" } ], "trust": 0.6 } }
var-202111-0871
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0871", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "NVD", "id": "CVE-2021-37024" } ] }, "cve": "CVE-2021-37024", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37024", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398857", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37024", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37024", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37024", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37024", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1890", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398857", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398857" }, { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "CNNVD", "id": "CNNVD-202111-1890" }, { "db": "NVD", "id": "CVE-2021-37024" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37024" }, { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "VULHUB", "id": "VHN-398857" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37024", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015564", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1890", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398857", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398857" }, { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "CNNVD", "id": "CNNVD-202111-1890" }, { "db": "NVD", "id": "CVE-2021-37024" } ] }, "id": "VAR-202111-0871", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398857" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:22:03.539000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172188" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "CNNVD", "id": "CNNVD-202111-1890" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398857" }, { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "NVD", "id": "CVE-2021-37024" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37024" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398857" }, { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "CNNVD", "id": "CNNVD-202111-1890" }, { "db": "NVD", "id": "CVE-2021-37024" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398857" }, { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "CNNVD", "id": "CNNVD-202111-1890" }, { "db": "NVD", "id": "CVE-2021-37024" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398857" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1890" }, { "date": "2021-11-23T16:15:09.540000", "db": "NVD", "id": "CVE-2021-37024" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398857" }, { "date": "2022-11-24T07:07:00", "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1890" }, { "date": "2021-11-29T18:02:48.780000", "db": "NVD", "id": "CVE-2021-37024" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1890" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015564" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1890" } ], "trust": 0.6 } }
var-202110-1458
Vulnerability from variot
A component of the HarmonyOS has a Allocation of Resources Without Limits or Throttling vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1458", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "NVD", "id": "CVE-2021-22461" } ] }, "cve": "CVE-2021-22461", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22461", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380896", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22461", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22461", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22461", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22461", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2053", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380896", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380896" }, { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "CNNVD", "id": "CNNVD-202110-2053" }, { "db": "NVD", "id": "CVE-2021-22461" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Allocation of Resources Without Limits or Throttling vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash", "sources": [ { "db": "NVD", "id": "CVE-2021-22461" }, { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "VULHUB", "id": "VHN-380896" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22461", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014244", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2053", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380896", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380896" }, { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "CNNVD", "id": "CNNVD-202110-2053" }, { "db": "NVD", "id": "CVE-2021-22461" } ] }, "id": "VAR-202110-1458", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380896" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:01:17.651000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=168200" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "CNNVD", "id": "CNNVD-202110-2053" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-770", "trust": 1.1 }, { "problemtype": "Allocation of resources without limits or throttling (CWE-770) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380896" }, { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "NVD", "id": "CVE-2021-22461" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22461" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380896" }, { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "CNNVD", "id": "CNNVD-202110-2053" }, { "db": "NVD", "id": "CVE-2021-22461" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380896" }, { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "CNNVD", "id": "CNNVD-202110-2053" }, { "db": "NVD", "id": "CVE-2021-22461" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380896" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2053" }, { "date": "2021-10-28T13:15:09.273000", "db": "NVD", "id": "CVE-2021-22461" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380896" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2053" }, { "date": "2021-11-01T19:46:24.063000", "db": "NVD", "id": "CVE-2021-22461" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2053" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in resource allocation without restrictions or throttling in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014244" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2053" } ], "trust": 0.6 } }
var-202201-1040
Vulnerability from variot
There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1040", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" } ] }, "cve": "CVE-2021-40035", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40035", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401436", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40035", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40035", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40035", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40035", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202201-280", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401436", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "CNNVD", "id": "CNNVD-202201-280" }, { "db": "NVD", "id": "CVE-2021-40035" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "VULHUB", "id": "VHN-401436" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40035", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002908", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-280", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-13181", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401436", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "CNNVD", "id": "CNNVD-202201-280" }, { "db": "NVD", "id": "CVE-2021-40035" } ] }, "id": "VAR-202201-1040", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401436" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:01:09.643000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177446" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40035" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "CNNVD", "id": "CNNVD-202201-280" }, { "db": "NVD", "id": "CVE-2021-40035" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "CNNVD", "id": "CNNVD-202201-280" }, { "db": "NVD", "id": "CVE-2021-40035" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401436" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-280" }, { "date": "2022-01-10T14:10:22.360000", "db": "NVD", "id": "CVE-2021-40035" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401436" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-280" }, { "date": "2022-01-13T15:32:16.207000", "db": "NVD", "id": "CVE-2021-40035" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-280" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002908" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-280" } ], "trust": 0.6 } }
var-202210-0254
Vulnerability from variot
The HwAirlink module has a heap overflow vulnerability.Successful exploitation of this vulnerability may cause out-of-bounds writes, resulting in modification of sensitive data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0254", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38977" } ] }, "cve": "CVE-2022-38977", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-38977", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38977", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-149", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-149" }, { "db": "NVD", "id": "CVE-2022-38977" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwAirlink module has a heap overflow vulnerability.Successful exploitation of this vulnerability may cause out-of-bounds writes, resulting in modification of sensitive data", "sources": [ { "db": "NVD", "id": "CVE-2022-38977" }, { "db": "VULHUB", "id": "VHN-434757" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38977", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-149", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434757", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434757" }, { "db": "CNNVD", "id": "CNNVD-202210-149" }, { "db": "NVD", "id": "CVE-2022-38977" } ] }, "id": "VAR-202210-0254", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434757" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:43:41.659000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211145" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-149" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434757" }, { "db": "NVD", "id": "CVE-2022-38977" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38977/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434757" }, { "db": "CNNVD", "id": "CNNVD-202210-149" }, { "db": "NVD", "id": "CVE-2022-38977" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434757" }, { "db": "CNNVD", "id": "CNNVD-202210-149" }, { "db": "NVD", "id": "CVE-2022-38977" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434757" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-149" }, { "date": "2022-10-14T16:15:13.017000", "db": "NVD", "id": "CVE-2022-38977" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434757" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-149" }, { "date": "2022-10-18T15:39:19.930000", "db": "NVD", "id": "CVE-2022-38977" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-149" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-149" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-149" } ], "trust": 0.6 } }
var-202109-1956
Vulnerability from variot
The interface of a certain HarmonyOS module has a UAF vulnerability. Successful exploitation of this vulnerability may lead to information leakage. HarmonyOS The module contains a usage of freed memory vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1956", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "NVD", "id": "CVE-2021-22478" } ] }, "cve": "CVE-2021-22478", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-22478", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380913", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22478", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22478", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22478", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22478", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202109-2065", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380913", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380913" }, { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "CNNVD", "id": "CNNVD-202109-2065" }, { "db": "NVD", "id": "CVE-2021-22478" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The interface of a certain HarmonyOS module has a UAF vulnerability. Successful exploitation of this vulnerability may lead to information leakage. HarmonyOS The module contains a usage of freed memory vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22478" }, { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "VULHUB", "id": "VHN-380913" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22478", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018624", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2065", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380913", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380913" }, { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "CNNVD", "id": "CNNVD-202109-2065" }, { "db": "NVD", "id": "CVE-2021-22478" } ] }, "id": "VAR-202109-1956", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380913" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:11:14.241000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171978" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "CNNVD", "id": "CNNVD-202109-2065" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380913" }, { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "NVD", "id": "CVE-2021-22478" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22478" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22478/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380913" }, { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "CNNVD", "id": "CNNVD-202109-2065" }, { "db": "NVD", "id": "CVE-2021-22478" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380913" }, { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "CNNVD", "id": "CNNVD-202109-2065" }, { "db": "NVD", "id": "CVE-2021-22478" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380913" }, { "date": "2023-07-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2065" }, { "date": "2022-02-25T19:15:10.910000", "db": "NVD", "id": "CVE-2021-22478" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380913" }, { "date": "2023-07-04T01:56:00", "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2065" }, { "date": "2022-03-07T19:05:26.517000", "db": "NVD", "id": "CVE-2021-22478" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2065" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Module Use of Freed Memory Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018624" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2065" } ], "trust": 0.6 } }
var-202208-0704
Vulnerability from variot
The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0704", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" } ] }, "cve": "CVE-2021-40034", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40034", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40034", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40034", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40034", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202208-2403", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" }, { "db": "NVD", "id": "CVE-2021-40034" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "VULHUB", "id": "VHN-401435" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40034", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-020147", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2403", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401435", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401435" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" }, { "db": "NVD", "id": "CVE-2021-40034" } ] }, "id": "VAR-202208-0704", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401435" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:27:08.668000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=204204" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40034" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40034/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401435" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" }, { "db": "NVD", "id": "CVE-2021-40034" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401435" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" }, { "db": "NVD", "id": "CVE-2021-40034" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-401435" }, { "date": "2023-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2403" }, { "date": "2022-08-10T20:15:22.397000", "db": "NVD", "id": "CVE-2021-40034" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "VULHUB", "id": "VHN-401435" }, { "date": "2023-09-19T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "date": "2022-08-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2403" }, { "date": "2022-08-12T21:16:26.733000", "db": "NVD", "id": "CVE-2021-40034" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2403" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2403" } ], "trust": 0.6 } }
var-202301-0683
Vulnerability from variot
The DMSDP module of the distributed hardware has a vulnerability that may cause imposter control connections.Successful exploitation of this vulnerability may disconnect normal service connections. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0683", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "NVD", "id": "CVE-2022-47976" } ] }, "cve": "CVE-2022-47976", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-47976", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-47976", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-47976", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-47976", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202301-434", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "CNNVD", "id": "CNNVD-202301-434" }, { "db": "NVD", "id": "CVE-2022-47976" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DMSDP module of the distributed hardware has a vulnerability that may cause imposter control connections.Successful exploitation of this vulnerability may disconnect normal service connections. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-47976" }, { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "VULHUB", "id": "VHN-449904" }, { "db": "VULMON", "id": "CVE-2022-47976" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-47976", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001766", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-434", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449904", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-47976", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449904" }, { "db": "VULMON", "id": "CVE-2022-47976" }, { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "CNNVD", "id": "CNNVD-202301-434" }, { "db": "NVD", "id": "CVE-2022-47976" } ] }, "id": "VAR-202301-0683", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449904" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:42:08.473000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=221311" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "NVD", "id": "CVE-2022-47976" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-47976" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-47976/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449904" }, { "db": "VULMON", "id": "CVE-2022-47976" }, { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "CNNVD", "id": "CNNVD-202301-434" }, { "db": "NVD", "id": "CVE-2022-47976" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449904" }, { "db": "VULMON", "id": "CVE-2022-47976" }, { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "CNNVD", "id": "CNNVD-202301-434" }, { "db": "NVD", "id": "CVE-2022-47976" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449904" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-47976" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-434" }, { "date": "2023-01-06T20:15:09.937000", "db": "NVD", "id": "CVE-2022-47976" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-449904" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-47976" }, { "date": "2023-05-09T01:29:00", "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-434" }, { "date": "2023-01-12T15:57:52.347000", "db": "NVD", "id": "CVE-2022-47976" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-434" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-434" } ], "trust": 0.6 } }
var-202301-0511
Vulnerability from variot
The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0511", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "NVD", "id": "CVE-2021-46867" } ] }, "cve": "CVE-2021-46867", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-46867", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46867", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46867", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-46867", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202301-440", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "CNNVD", "id": "CNNVD-202301-440" }, { "db": "NVD", "id": "CVE-2021-46867" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-46867" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "VULHUB", "id": "VHN-449872" }, { "db": "VULMON", "id": "CVE-2021-46867" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46867", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001772", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-440", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449872", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46867", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449872" }, { "db": "VULMON", "id": "CVE-2021-46867" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "CNNVD", "id": "CNNVD-202301-440" }, { "db": "NVD", "id": "CVE-2021-46867" } ] }, "id": "VAR-202301-0511", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449872" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:17:30.859000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=221317" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449872" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "NVD", "id": "CVE-2021-46867" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46867" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46867/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449872" }, { "db": "VULMON", "id": "CVE-2021-46867" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "CNNVD", "id": "CNNVD-202301-440" }, { "db": "NVD", "id": "CVE-2021-46867" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449872" }, { "db": "VULMON", "id": "CVE-2021-46867" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "CNNVD", "id": "CNNVD-202301-440" }, { "db": "NVD", "id": "CVE-2021-46867" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449872" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2021-46867" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-440" }, { "date": "2023-01-06T20:15:09.573000", "db": "NVD", "id": "CVE-2021-46867" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-449872" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2021-46867" }, { "date": "2023-05-09T02:02:00", "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-440" }, { "date": "2023-01-12T14:14:56.150000", "db": "NVD", "id": "CVE-2021-46867" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-440" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001772" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-440" } ], "trust": 0.6 } }
var-202110-1869
Vulnerability from variot
Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues. HarmonyOS for, SQL There is an injection vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1869", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "NVD", "id": "CVE-2021-39978" } ] }, "cve": "CVE-2021-39978", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-39978", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401379", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-39978", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39978", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39978", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39978", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2212", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401379", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401379" }, { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "CNNVD", "id": "CNNVD-202110-2212" }, { "db": "NVD", "id": "CVE-2021-39978" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues. HarmonyOS for, SQL There is an injection vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-39978" }, { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "VULHUB", "id": "VHN-401379" }, { "db": "VULMON", "id": "CVE-2021-39978" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39978", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017588", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2212", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401379", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39978", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401379" }, { "db": "VULMON", "id": "CVE-2021-39978" }, { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "CNNVD", "id": "CNNVD-202110-2212" }, { "db": "NVD", "id": "CVE-2021-39978" } ] }, "id": "VAR-202110-1869", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401379" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:55:46.295000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176760" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "CNNVD", "id": "CNNVD-202110-2212" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-89", "trust": 1.1 }, { "problemtype": "SQL injection (CWE-89) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401379" }, { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "NVD", "id": "CVE-2021-39978" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39978" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401379" }, { "db": "VULMON", "id": "CVE-2021-39978" }, { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "CNNVD", "id": "CNNVD-202110-2212" }, { "db": "NVD", "id": "CVE-2021-39978" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401379" }, { "db": "VULMON", "id": "CVE-2021-39978" }, { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "CNNVD", "id": "CNNVD-202110-2212" }, { "db": "NVD", "id": "CVE-2021-39978" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401379" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39978" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2212" }, { "date": "2022-01-03T22:15:10.473000", "db": "NVD", "id": "CVE-2021-39978" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401379" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39978" }, { "date": "2023-01-27T03:26:00", "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2212" }, { "date": "2022-01-13T15:44:20.833000", "db": "NVD", "id": "CVE-2021-39978" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2212" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 In \u00a0SQL\u00a0 Injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017588" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SQL injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2212" } ], "trust": 0.6 } }
var-202211-0676
Vulnerability from variot
There is a vulnerability in permission verification during the Bluetooth pairing process. Successful exploitation of this vulnerability may cause the dialog box for confirming the pairing not to be displayed during Bluetooth pairing. Huawei of HarmonyOS and EMUI There is a vulnerability in improper default permissions.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0676", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "NVD", "id": "CVE-2022-44548" } ] }, "cve": "CVE-2022-44548", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2022-44548", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44548", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44548", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-44548", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202211-2131", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "CNNVD", "id": "CNNVD-202211-2131" }, { "db": "NVD", "id": "CVE-2022-44548" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability in permission verification during the Bluetooth pairing process. Successful exploitation of this vulnerability may cause the dialog box for confirming the pairing not to be displayed during Bluetooth pairing. Huawei of HarmonyOS and EMUI There is a vulnerability in improper default permissions.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-44548" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "VULHUB", "id": "VHN-441928" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44548", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020505", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2131", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441928", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441928" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "CNNVD", "id": "CNNVD-202211-2131" }, { "db": "NVD", "id": "CVE-2022-44548" } ] }, "id": "VAR-202211-0676", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441928" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:29.952000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213635" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441928" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "NVD", "id": "CVE-2022-44548" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44548" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44548/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441928" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "CNNVD", "id": "CNNVD-202211-2131" }, { "db": "NVD", "id": "CVE-2022-44548" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441928" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "CNNVD", "id": "CNNVD-202211-2131" }, { "db": "NVD", "id": "CVE-2022-44548" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441928" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2131" }, { "date": "2022-11-09T21:15:18.067000", "db": "NVD", "id": "CVE-2022-44548" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441928" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2131" }, { "date": "2022-11-10T13:54:39.160000", "db": "NVD", "id": "CVE-2022-44548" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2131" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability regarding improper default permissions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020505" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2131" } ], "trust": 0.6 } }
var-202302-0468
Vulnerability from variot
The Bluetooth module has an OOM vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0468", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "NVD", "id": "CVE-2022-48293" } ] }, "cve": "CVE-2022-48293", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2022-48293", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48293", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48293", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-48293", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202302-345", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "CNNVD", "id": "CNNVD-202302-345" }, { "db": "NVD", "id": "CVE-2022-48293" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Bluetooth module has an OOM vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48293" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "VULHUB", "id": "VHN-453373" }, { "db": "VULMON", "id": "CVE-2022-48293" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48293", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003379", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-345", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453373", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48293", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453373" }, { "db": "VULMON", "id": "CVE-2022-48293" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "CNNVD", "id": "CNNVD-202302-345" }, { "db": "NVD", "id": "CVE-2022-48293" } ] }, "id": "VAR-202302-0468", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453373" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:02.575000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225746" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453373" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "NVD", "id": "CVE-2022-48293" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48293" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48293/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453373" }, { "db": "VULMON", "id": "CVE-2022-48293" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "CNNVD", "id": "CNNVD-202302-345" }, { "db": "NVD", "id": "CVE-2022-48293" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453373" }, { "db": "VULMON", "id": "CVE-2022-48293" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "CNNVD", "id": "CNNVD-202302-345" }, { "db": "NVD", "id": "CVE-2022-48293" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453373" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48293" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-345" }, { "date": "2023-02-09T17:15:13.450000", "db": "NVD", "id": "CVE-2022-48293" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453373" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48293" }, { "date": "2023-09-07T01:52:00", "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-345" }, { "date": "2023-02-16T19:20:47.607000", "db": "NVD", "id": "CVE-2022-48293" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-345" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003379" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-345" } ], "trust": 0.6 } }
var-202110-1504
Vulnerability from variot
A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause out-of-bounds write
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1504", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "NVD", "id": "CVE-2021-22457" } ] }, "cve": "CVE-2021-22457", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22457", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380892", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22457", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22457", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22457", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2021-22457", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202110-2047", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-380892", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380892" }, { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "CNNVD", "id": "CNNVD-202110-2047" }, { "db": "NVD", "id": "CVE-2021-22457" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause out-of-bounds write", "sources": [ { "db": "NVD", "id": "CVE-2021-22457" }, { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "VULHUB", "id": "VHN-380892" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22457", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014243", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2047", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380892", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380892" }, { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "CNNVD", "id": "CNNVD-202110-2047" }, { "db": "NVD", "id": "CVE-2021-22457" } ] }, "id": "VAR-202110-1504", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380892" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:46.208000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171491" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "CNNVD", "id": "CNNVD-202110-2047" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380892" }, { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "NVD", "id": "CVE-2021-22457" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22457" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380892" }, { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "CNNVD", "id": "CNNVD-202110-2047" }, { "db": "NVD", "id": "CVE-2021-22457" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380892" }, { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "CNNVD", "id": "CNNVD-202110-2047" }, { "db": "NVD", "id": "CVE-2021-22457" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380892" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2047" }, { "date": "2021-10-28T13:15:09.107000", "db": "NVD", "id": "CVE-2021-22457" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380892" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2047" }, { "date": "2021-11-01T20:19:16.900000", "db": "NVD", "id": "CVE-2021-22457" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2047" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014243" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2047" } ], "trust": 0.6 } }
var-202108-0291
Vulnerability from variot
A component of the HarmonyOS has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevating Privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0291", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22425" } ] }, "cve": "CVE-2021-22425", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2021-22425", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380860", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22425", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22425", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-326", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380860", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22425", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380860" }, { "db": "VULMON", "id": "CVE-2021-22425" }, { "db": "CNNVD", "id": "CNNVD-202108-326" }, { "db": "NVD", "id": "CVE-2021-22425" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevating Privileges", "sources": [ { "db": "NVD", "id": "CVE-2021-22425" }, { "db": "VULHUB", "id": "VHN-380860" }, { "db": "VULMON", "id": "CVE-2021-22425" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22425", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-326", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380860", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22425", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380860" }, { "db": "VULMON", "id": "CVE-2021-22425" }, { "db": "CNNVD", "id": "CNNVD-202108-326" }, { "db": "NVD", "id": "CVE-2021-22425" } ] }, "id": "VAR-202108-0291", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380860" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:22:11.991000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=159486" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-326" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380860" }, { "db": "NVD", "id": "CVE-2021-22425" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22425" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/415.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380860" }, { "db": "VULMON", "id": "CVE-2021-22425" }, { "db": "CNNVD", "id": "CNNVD-202108-326" }, { "db": "NVD", "id": "CVE-2021-22425" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380860" }, { "db": "VULMON", "id": "CVE-2021-22425" }, { "db": "CNNVD", "id": "CNNVD-202108-326" }, { "db": "NVD", "id": "CVE-2021-22425" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380860" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22425" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-326" }, { "date": "2021-08-03T18:15:08.310000", "db": "NVD", "id": "CVE-2021-22425" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-10T00:00:00", "db": "VULHUB", "id": "VHN-380860" }, { "date": "2021-08-10T00:00:00", "db": "VULMON", "id": "CVE-2021-22425" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-326" }, { "date": "2021-08-10T21:17:52.270000", "db": "NVD", "id": "CVE-2021-22425" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-326" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Resource Management Error Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-326" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-326" } ], "trust": 0.6 } }
var-202112-0335
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0335", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" } ] }, "cve": "CVE-2021-37020", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37020", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398853", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37020", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37020", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37020", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37020", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2060", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398853", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" }, { "db": "NVD", "id": "CVE-2021-37020" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "VULHUB", "id": "VHN-398853" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37020", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015760", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2060", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398853", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" }, { "db": "NVD", "id": "CVE-2021-37020" } ] }, "id": "VAR-202112-0335", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398853" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:55:44.367000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173236" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37020" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" }, { "db": "NVD", "id": "CVE-2021-37020" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" }, { "db": "NVD", "id": "CVE-2021-37020" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398853" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2060" }, { "date": "2021-12-07T17:15:08.303000", "db": "NVD", "id": "CVE-2021-37020" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398853" }, { "date": "2022-11-30T01:43:00", "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2060" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37020" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2060" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015760" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2060" } ], "trust": 0.6 } }
var-202203-0268
Vulnerability from variot
There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI contains a type confusion vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0268", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" } ] }, "cve": "CVE-2021-40061", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40061", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401462", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40061", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40061", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40061", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40061", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202203-974", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401462", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "CNNVD", "id": "CNNVD-202203-974" }, { "db": "NVD", "id": "CVE-2021-40061" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI contains a type confusion vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "VULHUB", "id": "VHN-401462" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40061", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018703", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-974", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401462", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "CNNVD", "id": "CNNVD-202203-974" }, { "db": "NVD", "id": "CVE-2021-40061" } ] }, "id": "VAR-202203-0268", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401462" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:55.911000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=186006" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-843", "trust": 1.1 }, { "problemtype": "Mistake of type (CWE-843) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40061" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40061/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "CNNVD", "id": "CNNVD-202203-974" }, { "db": "NVD", "id": "CVE-2021-40061" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "CNNVD", "id": "CNNVD-202203-974" }, { "db": "NVD", "id": "CVE-2021-40061" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401462" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-974" }, { "date": "2022-03-10T17:43:23.707000", "db": "NVD", "id": "CVE-2021-40061" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401462" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-974" }, { "date": "2022-03-14T16:18:51.173000", "db": "NVD", "id": "CVE-2021-40061" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-974" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product type mix-up vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018703" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-974" } ], "trust": 0.6 } }
var-202205-0438
Vulnerability from variot
The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a denial of service vulnerability in the HUAWEI HarmonyOS AI business component. The vulnerability is due to the fact that hiaiserver does not perform strict legality verification on the weights in the model
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0438", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "cve": "CVE-2022-22261", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-22261", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409790", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-22261", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22261", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-22261", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-22261", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202205-2545", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409790", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22261", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a denial of service vulnerability in the HUAWEI HarmonyOS AI business component. The vulnerability is due to the fact that hiaiserver does not perform strict legality verification on the weights in the model", "sources": [ { "db": "NVD", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22261", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009671", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2545", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-41787", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409790", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22261", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "id": "VAR-202205-0438", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409790" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:23.677000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193766" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-RCE " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22261" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22261/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-409790" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-22261" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "date": "2022-05-13T15:15:08.840000", "db": "NVD", "id": "CVE-2022-22261" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-409790" }, { "date": "2022-05-23T00:00:00", "db": "VULMON", "id": "CVE-2022-22261" }, { "date": "2023-08-07T08:15:00", "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "date": "2022-05-23T18:43:51.920000", "db": "NVD", "id": "CVE-2022-22261" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2545" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009671" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2545" } ], "trust": 0.6 } }
var-202111-1769
Vulnerability from variot
There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1769", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" } ] }, "cve": "CVE-2021-39974", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-39974", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401375", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-39974", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39974", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39974", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39974", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-2131", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401375", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" }, { "db": "NVD", "id": "CVE-2021-39974" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39974", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017604", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2131", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401375", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39974", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" }, { "db": "NVD", "id": "CVE-2021-39974" } ] }, "id": "VAR-202111-1769", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401375" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:44.506000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176792" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39974" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" }, { "db": "NVD", "id": "CVE-2021-39974" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" }, { "db": "NVD", "id": "CVE-2021-39974" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401375" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39974" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2131" }, { "date": "2022-01-03T22:15:10.333000", "db": "NVD", "id": "CVE-2021-39974" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401375" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39974" }, { "date": "2023-01-27T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2131" }, { "date": "2022-01-13T15:52:46.770000", "db": "NVD", "id": "CVE-2021-39974" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2131" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds reading vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017604" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2131" } ], "trust": 0.6 } }
var-202210-0367
Vulnerability from variot
The HISP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause unauthorized access to the HISP module
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0367", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39011" } ] }, "cve": "CVE-2022-39011", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-39011", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-39011", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-183", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-183" }, { "db": "NVD", "id": "CVE-2022-39011" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HISP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause unauthorized access to the HISP module", "sources": [ { "db": "NVD", "id": "CVE-2022-39011" }, { "db": "VULHUB", "id": "VHN-434779" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39011", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-183", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434779", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434779" }, { "db": "CNNVD", "id": "CNNVD-202210-183" }, { "db": "NVD", "id": "CVE-2022-39011" } ] }, "id": "VAR-202210-0367", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434779" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:42:20.517000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211159" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39011" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39011/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434779" }, { "db": "CNNVD", "id": "CNNVD-202210-183" }, { "db": "NVD", "id": "CVE-2022-39011" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434779" }, { "db": "CNNVD", "id": "CNNVD-202210-183" }, { "db": "NVD", "id": "CVE-2022-39011" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434779" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-183" }, { "date": "2022-10-14T16:15:18.057000", "db": "NVD", "id": "CVE-2022-39011" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434779" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-183" }, { "date": "2022-10-18T17:37:02.827000", "db": "NVD", "id": "CVE-2022-39011" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-183" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-183" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-183" } ], "trust": 0.6 } }
var-202209-0391
Vulnerability from variot
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0391", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" } ] }, "cve": "CVE-2022-39005", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-39005", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-39005", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-39005", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-39005", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-194", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "CNNVD", "id": "CNNVD-202209-194" }, { "db": "NVD", "id": "CVE-2022-39005" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39005", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017589", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-194", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428499", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39005", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "CNNVD", "id": "CNNVD-202209-194" }, { "db": "NVD", "id": "CVE-2022-39005" } ] }, "id": "VAR-202209-0391", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428499" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:21:38.122000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=208090" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39005" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39005/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "CNNVD", "id": "CNNVD-202209-194" }, { "db": "NVD", "id": "CVE-2022-39005" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "CNNVD", "id": "CNNVD-202209-194" }, { "db": "NVD", "id": "CVE-2022-39005" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428499" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39005" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-194" }, { "date": "2022-09-16T18:15:18.090000", "db": "NVD", "id": "CVE-2022-39005" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428499" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39005" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-194" }, { "date": "2022-09-21T12:47:59.630000", "db": "NVD", "id": "CVE-2022-39005" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-194" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of freeing memory after expiration in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017589" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-194" } ], "trust": 0.6 } }
var-202203-0881
Vulnerability from variot
There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0881", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" } ] }, "cve": "CVE-2021-40047", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40047", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401448", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:C/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40047", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40047", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40047", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40047", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202203-1002", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401448", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" }, { "db": "NVD", "id": "CVE-2021-40047" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "VULHUB", "id": "VHN-401448" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40047", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018717", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-1002", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401448", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" }, { "db": "NVD", "id": "CVE-2021-40047" } ] }, "id": "VAR-202203-0881", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401448" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:19.658000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=185903" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40047" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40047/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" }, { "db": "NVD", "id": "CVE-2021-40047" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" }, { "db": "NVD", "id": "CVE-2021-40047" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401448" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-1002" }, { "date": "2022-03-10T17:43:16.463000", "db": "NVD", "id": "CVE-2021-40047" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401448" }, { "date": "2023-07-05T08:12:00", "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-1002" }, { "date": "2022-03-14T15:35:04.920000", "db": "NVD", "id": "CVE-2021-40047" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-1002" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of freeing memory after expiration in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018717" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-1002" } ], "trust": 0.6 } }
var-202302-0393
Vulnerability from variot
The Bluetooth module has an out-of-memory (OOM) vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0393", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "NVD", "id": "CVE-2022-48292" } ] }, "cve": "CVE-2022-48292", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2022-48292", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48292", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48292", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-48292", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202302-347", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "CNNVD", "id": "CNNVD-202302-347" }, { "db": "NVD", "id": "CVE-2022-48292" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Bluetooth module has an out-of-memory (OOM) vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48292" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "VULHUB", "id": "VHN-453372" }, { "db": "VULMON", "id": "CVE-2022-48292" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48292", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003378", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-347", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453372", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48292", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453372" }, { "db": "VULMON", "id": "CVE-2022-48292" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "CNNVD", "id": "CNNVD-202302-347" }, { "db": "NVD", "id": "CVE-2022-48292" } ] }, "id": "VAR-202302-0393", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453372" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:19.699000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225748" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453372" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "NVD", "id": "CVE-2022-48292" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48292" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48292/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453372" }, { "db": "VULMON", "id": "CVE-2022-48292" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "CNNVD", "id": "CNNVD-202302-347" }, { "db": "NVD", "id": "CVE-2022-48292" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453372" }, { "db": "VULMON", "id": "CVE-2022-48292" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "CNNVD", "id": "CNNVD-202302-347" }, { "db": "NVD", "id": "CVE-2022-48292" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453372" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48292" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-347" }, { "date": "2023-02-09T17:15:13.260000", "db": "NVD", "id": "CVE-2022-48292" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453372" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48292" }, { "date": "2023-09-07T01:51:00", "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-347" }, { "date": "2023-02-16T19:12:13.887000", "db": "NVD", "id": "CVE-2022-48292" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-347" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003378" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-347" } ], "trust": 0.6 } }
var-202210-0348
Vulnerability from variot
The fingerprint module has service logic errors.Successful exploitation of this vulnerability will cause the phone lock to be cracked
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0348", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38982" } ] }, "cve": "CVE-2022-38982", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38982", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38982", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-165", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-165" }, { "db": "NVD", "id": "CVE-2022-38982" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The fingerprint module has service logic errors.Successful exploitation of this vulnerability will cause the phone lock to be cracked", "sources": [ { "db": "NVD", "id": "CVE-2022-38982" }, { "db": "VULHUB", "id": "VHN-434761" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38982", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-165", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434761", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434761" }, { "db": "CNNVD", "id": "CNNVD-202210-165" }, { "db": "NVD", "id": "CVE-2022-38982" } ] }, "id": "VAR-202210-0348", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434761" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:06.750000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211447" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-165" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38982" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38982/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434761" }, { "db": "CNNVD", "id": "CNNVD-202210-165" }, { "db": "NVD", "id": "CVE-2022-38982" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434761" }, { "db": "CNNVD", "id": "CNNVD-202210-165" }, { "db": "NVD", "id": "CVE-2022-38982" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434761" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-165" }, { "date": "2022-10-14T16:15:14.433000", "db": "NVD", "id": "CVE-2022-38982" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-20T00:00:00", "db": "VULHUB", "id": "VHN-434761" }, { "date": "2022-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-165" }, { "date": "2022-10-20T13:04:53.943000", "db": "NVD", "id": "CVE-2022-38982" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-165" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-165" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-165" } ], "trust": 0.6 } }
var-202201-1022
Vulnerability from variot
There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI Exists in an out-of-bounds write vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1022", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" } ] }, "cve": "CVE-2021-40026", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40026", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401427", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40026", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40026", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40026", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40026", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202201-312", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401427", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "CNNVD", "id": "CNNVD-202201-312" }, { "db": "NVD", "id": "CVE-2021-40026" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI Exists in an out-of-bounds write vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations", "sources": [ { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "VULHUB", "id": "VHN-401427" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40026", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002899", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-312", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401427", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "CNNVD", "id": "CNNVD-202201-312" }, { "db": "NVD", "id": "CVE-2021-40026" } ] }, "id": "VAR-202201-1022", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401427" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:25:04.070000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Wearables Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=178009" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40026" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202201-0000001239056313" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "CNNVD", "id": "CNNVD-202201-312" }, { "db": "NVD", "id": "CVE-2021-40026" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "CNNVD", "id": "CNNVD-202201-312" }, { "db": "NVD", "id": "CVE-2021-40026" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401427" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-312" }, { "date": "2022-01-10T14:10:21.760000", "db": "NVD", "id": "CVE-2021-40026" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401427" }, { "date": "2023-01-25T08:35:00", "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-312" }, { "date": "2022-01-13T14:26:51.273000", "db": "NVD", "id": "CVE-2021-40026" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-312" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002899" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-312" } ], "trust": 0.6 } }
var-202110-1863
Vulnerability from variot
Hilinksvc service exists a Data Processing Errors vulnerability .Successful exploitation of this vulnerability may cause application crash. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1863", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "NVD", "id": "CVE-2021-37098" } ] }, "cve": "CVE-2021-37098", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37098", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398934", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37098", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37098", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37098", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37098", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2218", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398934", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398934" }, { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "CNNVD", "id": "CNNVD-202110-2218" }, { "db": "NVD", "id": "CVE-2021-37098" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Hilinksvc service exists a Data Processing Errors vulnerability .Successful exploitation of this vulnerability may cause application crash. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37098" }, { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "VULHUB", "id": "VHN-398934" }, { "db": "VULMON", "id": "CVE-2021-37098" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37098", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017382", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2218", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398934", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37098", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398934" }, { "db": "VULMON", "id": "CVE-2021-37098" }, { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "CNNVD", "id": "CNNVD-202110-2218" }, { "db": "NVD", "id": "CVE-2021-37098" } ] }, "id": "VAR-202110-1863", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398934" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:18:19.188000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176766" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "CNNVD", "id": "CNNVD-202110-2218" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "NVD", "id": "CVE-2021-37098" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37098" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398934" }, { "db": "VULMON", "id": "CVE-2021-37098" }, { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "CNNVD", "id": "CNNVD-202110-2218" }, { "db": "NVD", "id": "CVE-2021-37098" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398934" }, { "db": "VULMON", "id": "CVE-2021-37098" }, { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "CNNVD", "id": "CNNVD-202110-2218" }, { "db": "NVD", "id": "CVE-2021-37098" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398934" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37098" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2218" }, { "date": "2022-01-03T22:15:08.933000", "db": "NVD", "id": "CVE-2021-37098" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398934" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37098" }, { "date": "2023-01-17T07:13:00", "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2218" }, { "date": "2022-01-11T18:13:47.937000", "db": "NVD", "id": "CVE-2021-37098" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2218" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017382" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2218" } ], "trust": 0.6 } }
var-202211-0384
Vulnerability from variot
The lock screen module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0384", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44552" } ] }, "cve": "CVE-2022-44552", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-44552", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44552", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2122", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2122" }, { "db": "NVD", "id": "CVE-2022-44552" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The lock screen module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability", "sources": [ { "db": "NVD", "id": "CVE-2022-44552" }, { "db": "VULHUB", "id": "VHN-441936" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44552", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2122", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441936", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441936" }, { "db": "CNNVD", "id": "CNNVD-202211-2122" }, { "db": "NVD", "id": "CVE-2022-44552" } ] }, "id": "VAR-202211-0384", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441936" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:30:55.762000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=214352" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44552" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44552/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441936" }, { "db": "CNNVD", "id": "CNNVD-202211-2122" }, { "db": "NVD", "id": "CVE-2022-44552" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441936" }, { "db": "CNNVD", "id": "CNNVD-202211-2122" }, { "db": "NVD", "id": "CVE-2022-44552" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441936" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2122" }, { "date": "2022-11-09T21:15:18.387000", "db": "NVD", "id": "CVE-2022-44552" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441936" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2122" }, { "date": "2022-11-14T19:15:20.207000", "db": "NVD", "id": "CVE-2022-44552" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2122" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2122" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2122" } ], "trust": 0.6 } }
var-202107-1681
Vulnerability from variot
There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1681", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" } ] }, "cve": "CVE-2021-22431", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22431", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380866", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-22431", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22431", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22431", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-22431", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202107-2224", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380866", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22431", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" }, { "db": "NVD", "id": "CVE-2021-22431" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22431", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018744", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2224", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380866", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22431", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" }, { "db": "NVD", "id": "CVE-2021-22431" } ] }, "id": "VAR-202107-1681", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380866" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:23:28.681000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171993" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22431" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22431/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" }, { "db": "NVD", "id": "CVE-2021-22431" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" }, { "db": "NVD", "id": "CVE-2021-22431" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380866" }, { "date": "2022-02-25T00:00:00", "db": "VULMON", "id": "CVE-2021-22431" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2224" }, { "date": "2022-02-25T19:15:09.833000", "db": "NVD", "id": "CVE-2021-22431" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380866" }, { "date": "2022-03-07T00:00:00", "db": "VULMON", "id": "CVE-2021-22431" }, { "date": "2023-07-06T01:45:00", "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2224" }, { "date": "2022-03-07T17:57:53.880000", "db": "NVD", "id": "CVE-2021-22431" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2224" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018744" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2224" } ], "trust": 0.6 } }
var-202209-0449
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0449", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" } ] }, "cve": "CVE-2022-38989", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-38989", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38989", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38989", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-38989", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-196", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "CNNVD", "id": "CNNVD-202209-196" }, { "db": "NVD", "id": "CVE-2022-38989" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "VULHUB", "id": "VHN-428498" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38989", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016790", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-196", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428498", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428498" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "CNNVD", "id": "CNNVD-202209-196" }, { "db": "NVD", "id": "CVE-2022-38989" } ] }, "id": "VAR-202209-0449", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428498" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:32.077000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208091" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38989" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38989/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428498" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "CNNVD", "id": "CNNVD-202209-196" }, { "db": "NVD", "id": "CVE-2022-38989" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428498" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "CNNVD", "id": "CNNVD-202209-196" }, { "db": "NVD", "id": "CVE-2022-38989" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428498" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-196" }, { "date": "2022-09-16T18:15:17.513000", "db": "NVD", "id": "CVE-2022-38989" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428498" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-196" }, { "date": "2022-09-17T03:45:39.930000", "db": "NVD", "id": "CVE-2022-38989" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-196" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-196" } ], "trust": 0.6 } }
var-202112-0223
Vulnerability from variot
There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete any file. HarmonyOS Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is China's Huawei ( Huawei ) company's operating system. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0223", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "NVD", "id": "CVE-2021-37099" } ] }, "cve": "CVE-2021-37099", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37099", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398935", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37099", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37099", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37099", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37099", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2025", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398935", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398935" }, { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "CNNVD", "id": "CNNVD-202109-2025" }, { "db": "NVD", "id": "CVE-2021-37099" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete any file. HarmonyOS Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is China\u0027s Huawei ( Huawei ) company\u0027s operating system. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37099" }, { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "VULHUB", "id": "VHN-398935" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37099", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015880", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2025", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103534", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398935", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398935" }, { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "CNNVD", "id": "CNNVD-202109-2025" }, { "db": "NVD", "id": "CVE-2021-37099" } ] }, "id": "VAR-202112-0223", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398935" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:50.577000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173502" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "CNNVD", "id": "CNNVD-202109-2025" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398935" }, { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "NVD", "id": "CVE-2021-37099" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37099" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398935" }, { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "CNNVD", "id": "CNNVD-202109-2025" }, { "db": "NVD", "id": "CVE-2021-37099" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398935" }, { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "CNNVD", "id": "CNNVD-202109-2025" }, { "db": "NVD", "id": "CVE-2021-37099" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398935" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2025" }, { "date": "2021-12-07T17:15:09.937000", "db": "NVD", "id": "CVE-2021-37099" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398935" }, { "date": "2022-12-01T06:56:00", "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2025" }, { "date": "2021-12-09T17:33:07.153000", "db": "NVD", "id": "CVE-2021-37099" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2025" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015880" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2025" } ], "trust": 0.6 } }
var-202211-0894
Vulnerability from variot
The graphics display module has a UAF vulnerability when traversing graphic layers. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS and EMUI Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0894", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "NVD", "id": "CVE-2022-44550" } ] }, "cve": "CVE-2022-44550", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-44550", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44550", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44550", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-44550", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202211-2120", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "CNNVD", "id": "CNNVD-202211-2120" }, { "db": "NVD", "id": "CVE-2022-44550" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The graphics display module has a UAF vulnerability when traversing graphic layers. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS and EMUI Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44550" }, { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "VULHUB", "id": "VHN-441932" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44550", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020503", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2120", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441932", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441932" }, { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "CNNVD", "id": "CNNVD-202211-2120" }, { "db": "NVD", "id": "CVE-2022-44550" } ] }, "id": "VAR-202211-0894", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441932" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:19.032000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213969" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.0 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "NVD", "id": "CVE-2022-44550" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44550" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44550/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441932" }, { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "CNNVD", "id": "CNNVD-202211-2120" }, { "db": "NVD", "id": "CVE-2022-44550" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441932" }, { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "CNNVD", "id": "CNNVD-202211-2120" }, { "db": "NVD", "id": "CVE-2022-44550" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441932" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2120" }, { "date": "2022-11-09T21:15:18.230000", "db": "NVD", "id": "CVE-2022-44550" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441932" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2120" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-44550" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2120" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020503" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2120" } ], "trust": 0.6 } }
var-202212-0651
Vulnerability from variot
The power consumption module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0651", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "NVD", "id": "CVE-2022-46317" } ] }, "cve": "CVE-2022-46317", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-46317", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46317", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46317", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-46317", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202212-2502", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "CNNVD", "id": "CNNVD-202212-2502" }, { "db": "NVD", "id": "CVE-2022-46317" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The power consumption module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46317" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "VULHUB", "id": "VHN-444287" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46317", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023890", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2502", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444287", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444287" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "CNNVD", "id": "CNNVD-202212-2502" }, { "db": "NVD", "id": "CVE-2022-46317" } ] }, "id": "VAR-202212-0651", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444287" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:43:37.620000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218955" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444287" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "NVD", "id": "CVE-2022-46317" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46317" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46317/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444287" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "CNNVD", "id": "CNNVD-202212-2502" }, { "db": "NVD", "id": "CVE-2022-46317" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444287" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "CNNVD", "id": "CNNVD-202212-2502" }, { "db": "NVD", "id": "CVE-2022-46317" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444287" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2502" }, { "date": "2022-12-20T21:15:11.493000", "db": "NVD", "id": "CVE-2022-46317" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444287" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2502" }, { "date": "2022-12-24T04:15:35.443000", "db": "NVD", "id": "CVE-2022-46317" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2502" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023890" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2502" } ], "trust": 0.6 } }
var-202112-0244
Vulnerability from variot
There is a Business Logic Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to persistent dos. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0244", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "NVD", "id": "CVE-2021-37071" } ] }, "cve": "CVE-2021-37071", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37071", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398905", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37071", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37071", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37071", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37071", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2032", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398905", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398905" }, { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "CNNVD", "id": "CNNVD-202109-2032" }, { "db": "NVD", "id": "CVE-2021-37071" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Business Logic Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to persistent dos. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37071" }, { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "VULHUB", "id": "VHN-398905" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37071", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015964", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2032", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398905", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398905" }, { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "CNNVD", "id": "CNNVD-202109-2032" }, { "db": "NVD", "id": "CVE-2021-37071" } ] }, "id": "VAR-202112-0244", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398905" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:50.552000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures to handle logic errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173509" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "CNNVD", "id": "CNNVD-202109-2032" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "NVD", "id": "CVE-2021-37071" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37071" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398905" }, { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "CNNVD", "id": "CNNVD-202109-2032" }, { "db": "NVD", "id": "CVE-2021-37071" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398905" }, { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "CNNVD", "id": "CNNVD-202109-2032" }, { "db": "NVD", "id": "CVE-2021-37071" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398905" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2032" }, { "date": "2021-12-07T17:15:09.007000", "db": "NVD", "id": "CVE-2021-37071" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398905" }, { "date": "2022-12-05T02:52:00", "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2032" }, { "date": "2021-12-09T17:37:41.137000", "db": "NVD", "id": "CVE-2021-37071" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2032" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015964" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "handling logic errors", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2032" } ], "trust": 0.6 } }
var-202107-1682
Vulnerability from variot
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1682", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" } ] }, "cve": "CVE-2021-22433", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22433", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380868", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-22433", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22433", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22433", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-22433", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202107-2223", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380868", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" }, { "db": "NVD", "id": "CVE-2021-22433" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "VULHUB", "id": "VHN-380868" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22433", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018742", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2223", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380868", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" }, { "db": "NVD", "id": "CVE-2021-22433" } ] }, "id": "VAR-202107-1682", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380868" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:25:16.813000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171989" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22433/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" }, { "db": "NVD", "id": "CVE-2021-22433" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" }, { "db": "NVD", "id": "CVE-2021-22433" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380868" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2223" }, { "date": "2022-02-25T19:15:10.157000", "db": "NVD", "id": "CVE-2021-22433" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380868" }, { "date": "2023-07-06T01:41:00", "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2223" }, { "date": "2022-03-07T17:58:49.180000", "db": "NVD", "id": "CVE-2021-22433" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2223" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018742" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2223" } ], "trust": 0.6 } }
var-202206-0119
Vulnerability from variot
The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0119", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" } ] }, "cve": "CVE-2022-31756", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2022-31756", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-423589", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-31756", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31756", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-31756", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-31756", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202206-476", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423589", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-31756", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "CNNVD", "id": "CNNVD-202206-476" }, { "db": "NVD", "id": "CVE-2022-31756" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31756", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011280", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-476", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66180", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423589", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31756", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "CNNVD", "id": "CNNVD-202206-476" }, { "db": "NVD", "id": "CVE-2022-31756" } ] }, "id": "VAR-202206-0119", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423589" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:42:24.532000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=195991" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31756" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31756/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "CNNVD", "id": "CNNVD-202206-476" }, { "db": "NVD", "id": "CVE-2022-31756" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "CNNVD", "id": "CNNVD-202206-476" }, { "db": "NVD", "id": "CVE-2022-31756" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423589" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31756" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-476" }, { "date": "2022-06-13T15:15:10.150000", "db": "NVD", "id": "CVE-2022-31756" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423589" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2022-31756" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-476" }, { "date": "2022-06-18T03:07:52.780000", "db": "NVD", "id": "CVE-2022-31756" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-476" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011280" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-476" } ], "trust": 0.6 } }
var-202211-0383
Vulnerability from variot
The memory management module has the logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0383", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "NVD", "id": "CVE-2021-46852" } ] }, "cve": "CVE-2021-46852", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-46852", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46852", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46852", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-46852", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202211-2136", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "CNNVD", "id": "CNNVD-202211-2136" }, { "db": "NVD", "id": "CVE-2021-46852" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The memory management module has the logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-46852" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "VULHUB", "id": "VHN-430160" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46852", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020634", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2136", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430160", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430160" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "CNNVD", "id": "CNNVD-202211-2136" }, { "db": "NVD", "id": "CVE-2021-46852" } ] }, "id": "VAR-202211-0383", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430160" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:21:30.625000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213974" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430160" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "NVD", "id": "CVE-2021-46852" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46852" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46852/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430160" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "CNNVD", "id": "CNNVD-202211-2136" }, { "db": "NVD", "id": "CVE-2021-46852" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430160" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "CNNVD", "id": "CNNVD-202211-2136" }, { "db": "NVD", "id": "CVE-2021-46852" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-430160" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2136" }, { "date": "2022-11-09T21:15:13.230000", "db": "NVD", "id": "CVE-2021-46852" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-430160" }, { "date": "2023-11-02T08:06:00", "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2136" }, { "date": "2022-11-10T19:32:16.360000", "db": "NVD", "id": "CVE-2021-46852" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2136" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020634" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2136" } ], "trust": 0.6 } }
var-202110-1431
Vulnerability from variot
A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to bypass the control mechanism
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1431", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "NVD", "id": "CVE-2021-22460" } ] }, "cve": "CVE-2021-22460", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22460", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380895", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22460", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22460", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22460", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22460", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2052", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380895", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380895" }, { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "CNNVD", "id": "CNNVD-202110-2052" }, { "db": "NVD", "id": "CVE-2021-22460" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to bypass the control mechanism", "sources": [ { "db": "NVD", "id": "CVE-2021-22460" }, { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "VULHUB", "id": "VHN-380895" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22460", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014466", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2052", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380895", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380895" }, { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "CNNVD", "id": "CNNVD-202110-2052" }, { "db": "NVD", "id": "CVE-2021-22460" } ] }, "id": "VAR-202110-1431", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380895" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:17:01.026000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Repair measures for data forgery problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171504" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "CNNVD", "id": "CNNVD-202110-2052" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-345", "trust": 1.1 }, { "problemtype": "Inadequate verification of data reliability (CWE-345) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380895" }, { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "NVD", "id": "CVE-2021-22460" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22460" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380895" }, { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "CNNVD", "id": "CNNVD-202110-2052" }, { "db": "NVD", "id": "CVE-2021-22460" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380895" }, { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "CNNVD", "id": "CNNVD-202110-2052" }, { "db": "NVD", "id": "CVE-2021-22460" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380895" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2052" }, { "date": "2021-10-28T13:15:09.230000", "db": "NVD", "id": "CVE-2021-22460" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380895" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2052" }, { "date": "2021-11-02T12:57:36.433000", "db": "NVD", "id": "CVE-2021-22460" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2052" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Inadequate validation of data reliability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014466" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2052" } ], "trust": 0.6 } }
var-202210-0125
Vulnerability from variot
The HW_KEYMASTER module has a vulnerability of missing bounds check on length.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0125", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "NVD", "id": "CVE-2021-46839" } ] }, "cve": "CVE-2021-46839", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-46839", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46839", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46839", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-46839", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202210-170", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "CNNVD", "id": "CNNVD-202210-170" }, { "db": "NVD", "id": "CVE-2021-46839" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a vulnerability of missing bounds check on length.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-46839" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "VULHUB", "id": "VHN-430150" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46839", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-019228", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-170", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430150", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430150" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "CNNVD", "id": "CNNVD-202210-170" }, { "db": "NVD", "id": "CVE-2021-46839" } ] }, "id": "VAR-202210-0125", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430150" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:14.719000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211152" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430150" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "NVD", "id": "CVE-2021-46839" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46839" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46839/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430150" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "CNNVD", "id": "CNNVD-202210-170" }, { "db": "NVD", "id": "CVE-2021-46839" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430150" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "CNNVD", "id": "CNNVD-202210-170" }, { "db": "NVD", "id": "CVE-2021-46839" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-430150" }, { "date": "2023-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-170" }, { "date": "2022-10-14T16:15:11.920000", "db": "NVD", "id": "CVE-2021-46839" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-430150" }, { "date": "2023-10-24T08:20:00", "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "date": "2022-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-170" }, { "date": "2022-10-18T14:50:26.943000", "db": "NVD", "id": "CVE-2021-46839" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-170" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019228" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-170" } ], "trust": 0.6 } }
var-202211-0419
Vulnerability from variot
The DDMP/ODMF module has a service hijacking vulnerability. Successful exploit of this vulnerability may cause services to be unavailable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0419", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44555" } ] }, "cve": "CVE-2022-44555", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-44555", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44555", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2121", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2121" }, { "db": "NVD", "id": "CVE-2022-44555" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DDMP/ODMF module has a service hijacking vulnerability. Successful exploit of this vulnerability may cause services to be unavailable", "sources": [ { "db": "NVD", "id": "CVE-2022-44555" }, { "db": "VULHUB", "id": "VHN-441942" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44555", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2121", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441942", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441942" }, { "db": "CNNVD", "id": "CNNVD-202211-2121" }, { "db": "NVD", "id": "CVE-2022-44555" } ] }, "id": "VAR-202211-0419", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441942" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:27.869000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=214351" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44555" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44555/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441942" }, { "db": "CNNVD", "id": "CNNVD-202211-2121" }, { "db": "NVD", "id": "CVE-2022-44555" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441942" }, { "db": "CNNVD", "id": "CNNVD-202211-2121" }, { "db": "NVD", "id": "CVE-2022-44555" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441942" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2121" }, { "date": "2022-11-09T21:15:18.557000", "db": "NVD", "id": "CVE-2022-44555" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441942" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2121" }, { "date": "2022-11-14T19:11:28.647000", "db": "NVD", "id": "CVE-2022-44555" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2121" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2121" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2121" } ], "trust": 0.6 } }
var-202211-0326
Vulnerability from variot
The system framework layer has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0326", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "NVD", "id": "CVE-2022-44562" } ] }, "cve": "CVE-2022-44562", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-44562", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-44562", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44562", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-44562", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202211-2133", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "CNNVD", "id": "CNNVD-202211-2133" }, { "db": "NVD", "id": "CVE-2022-44562" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system framework layer has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44562" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "VULHUB", "id": "VHN-441952" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44562", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020501", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2133", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441952", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441952" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "CNNVD", "id": "CNNVD-202211-2133" }, { "db": "NVD", "id": "CVE-2022-44562" } ] }, "id": "VAR-202211-0326", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441952" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:49:31.093000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213973" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441952" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "NVD", "id": "CVE-2022-44562" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44562" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44562/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441952" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "CNNVD", "id": "CNNVD-202211-2133" }, { "db": "NVD", "id": "CVE-2022-44562" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441952" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "CNNVD", "id": "CNNVD-202211-2133" }, { "db": "NVD", "id": "CVE-2022-44562" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441952" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2133" }, { "date": "2022-11-09T21:15:18.920000", "db": "NVD", "id": "CVE-2022-44562" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441952" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2133" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-44562" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2133" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020501" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2133" } ], "trust": 0.6 } }
var-202206-0375
Vulnerability from variot
The kernel module has the null pointer and out-of-bounds array vulnerabilities. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0375", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "NVD", "id": "CVE-2022-31763" } ] }, "cve": "CVE-2022-31763", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-31763", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423596", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2022-31763", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31763", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-31763", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-31763", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202206-478", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423596", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "CNNVD", "id": "CNNVD-202206-478" }, { "db": "NVD", "id": "CVE-2022-31763" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has the null pointer and out-of-bounds array vulnerabilities. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31763" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "VULHUB", "id": "VHN-423596" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31763", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-011276", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-478", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-47648", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423596", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "CNNVD", "id": "CNNVD-202206-478" }, { "db": "NVD", "id": "CVE-2022-31763" } ] }, "id": "VAR-202206-0375", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423596" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:36.281000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=196702" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "NVD", "id": "CVE-2022-31763" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31763" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31763/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "CNNVD", "id": "CNNVD-202206-478" }, { "db": "NVD", "id": "CVE-2022-31763" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "CNNVD", "id": "CNNVD-202206-478" }, { "db": "NVD", "id": "CVE-2022-31763" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423596" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-478" }, { "date": "2022-06-13T15:15:10.530000", "db": "NVD", "id": "CVE-2022-31763" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423596" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-478" }, { "date": "2022-06-18T03:11:49.183000", "db": "NVD", "id": "CVE-2022-31763" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-478" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011276" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-478" } ], "trust": 0.6 } }
var-202206-0261
Vulnerability from variot
The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0261", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" } ] }, "cve": "CVE-2022-31751", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-31751", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423584", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2022-31751", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31751", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-31751", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-31751", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202206-477", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423584", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31751", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "CNNVD", "id": "CNNVD-202206-477" }, { "db": "NVD", "id": "CVE-2022-31751" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31751", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011284", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-477", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66181", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423584", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31751", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "CNNVD", "id": "CNNVD-202206-477" }, { "db": "NVD", "id": "CVE-2022-31751" } ] }, "id": "VAR-202206-0261", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423584" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:00:57.417000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=195992" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31751" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31751/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "CNNVD", "id": "CNNVD-202206-477" }, { "db": "NVD", "id": "CVE-2022-31751" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "CNNVD", "id": "CNNVD-202206-477" }, { "db": "NVD", "id": "CVE-2022-31751" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423584" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31751" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-477" }, { "date": "2022-06-13T15:15:10.047000", "db": "NVD", "id": "CVE-2022-31751" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-05T00:00:00", "db": "VULHUB", "id": "VHN-423584" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2022-31751" }, { "date": "2023-08-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "date": "2022-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-477" }, { "date": "2022-10-05T15:16:52.523000", "db": "NVD", "id": "CVE-2022-31751" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-477" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011284" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-477" } ], "trust": 0.6 } }
var-202110-1457
Vulnerability from variot
A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause kernel crash
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1457", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "NVD", "id": "CVE-2021-22462" } ] }, "cve": "CVE-2021-22462", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22462", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380897", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22462", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22462", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22462", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22462", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2054", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380897", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-22462", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380897" }, { "db": "VULMON", "id": "CVE-2021-22462" }, { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "CNNVD", "id": "CNNVD-202110-2054" }, { "db": "NVD", "id": "CVE-2021-22462" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause kernel crash", "sources": [ { "db": "NVD", "id": "CVE-2021-22462" }, { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "VULHUB", "id": "VHN-380897" }, { "db": "VULMON", "id": "CVE-2021-22462" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22462", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014245", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2054", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380897", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22462", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380897" }, { "db": "VULMON", "id": "CVE-2021-22462" }, { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "CNNVD", "id": "CNNVD-202110-2054" }, { "db": "NVD", "id": "CVE-2021-22462" } ] }, "id": "VAR-202110-1457", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380897" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:27:35.379000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=168201" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "CNNVD", "id": "CNNVD-202110-2054" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380897" }, { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "NVD", "id": "CVE-2021-22462" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22462" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/476.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380897" }, { "db": "VULMON", "id": "CVE-2021-22462" }, { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "CNNVD", "id": "CNNVD-202110-2054" }, { "db": "NVD", "id": "CVE-2021-22462" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380897" }, { "db": "VULMON", "id": "CVE-2021-22462" }, { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "CNNVD", "id": "CNNVD-202110-2054" }, { "db": "NVD", "id": "CVE-2021-22462" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380897" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22462" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2054" }, { "date": "2021-10-28T13:15:09.317000", "db": "NVD", "id": "CVE-2021-22462" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380897" }, { "date": "2021-11-01T00:00:00", "db": "VULMON", "id": "CVE-2021-22462" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2054" }, { "date": "2021-11-01T19:28:24.997000", "db": "NVD", "id": "CVE-2021-22462" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2054" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014245" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2054" } ], "trust": 0.6 } }
var-202112-0327
Vulnerability from variot
There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0327", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" } ] }, "cve": "CVE-2021-37075", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37075", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398909", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37075", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37075", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37075", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37075", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2057", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398909", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" }, { "db": "NVD", "id": "CVE-2021-37075" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "VULHUB", "id": "VHN-398909" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37075", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015865", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2057", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398909", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" }, { "db": "NVD", "id": "CVE-2021-37075" } ] }, "id": "VAR-202112-0327", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398909" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:01:15.744000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Credential\u00a0management\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173804" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-522", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37075" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" }, { "db": "NVD", "id": "CVE-2021-37075" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" }, { "db": "NVD", "id": "CVE-2021-37075" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398909" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2057" }, { "date": "2021-12-08T15:15:09.867000", "db": "NVD", "id": "CVE-2021-37075" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398909" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2057" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37075" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2057" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015865" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2057" } ], "trust": 0.6 } }
var-202107-1683
Vulnerability from variot
There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1683", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "cve": "CVE-2021-22434", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22434", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380869", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-22434", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22434", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22434", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-22434", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202107-2222", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380869", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22434", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22434", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018741", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2222", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380869", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22434", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "id": "VAR-202107-1683", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380869" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:44:22.673000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171984" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22434" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22434/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380869" }, { "date": "2022-02-25T00:00:00", "db": "VULMON", "id": "CVE-2021-22434" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "date": "2022-02-25T19:15:10.317000", "db": "NVD", "id": "CVE-2021-22434" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380869" }, { "date": "2022-03-07T00:00:00", "db": "VULMON", "id": "CVE-2021-22434" }, { "date": "2023-07-06T01:37:00", "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "date": "2022-03-07T18:46:17.363000", "db": "NVD", "id": "CVE-2021-22434" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2222" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018741" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2222" } ], "trust": 0.6 } }
var-202201-1729
Vulnerability from variot
The bone voice ID TA has a memory overwrite vulnerability. Successful exploitation of this vulnerability may result in malicious code execution. Huawei of HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1729", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "db": "NVD", "id": "CVE-2021-40036" } ] }, "cve": "CVE-2021-40036", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40036", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401437", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40036", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40036", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40036", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-40036", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202201-275", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401437", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-40036", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401437" }, { "db": "VULMON", "id": "CVE-2021-40036" }, { "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "db": "CNNVD", "id": "CNNVD-202201-275" }, { "db": "NVD", "id": "CVE-2021-40036" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bone voice ID TA has a memory overwrite vulnerability. Successful exploitation of this vulnerability may result in malicious code execution. Huawei of HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40036" }, { "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "db": "VULHUB", "id": "VHN-401437" }, { "db": "VULMON", "id": "CVE-2021-40036" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40036", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-019920", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-275", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-66183", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401437", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40036", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401437" }, { "db": "VULMON", "id": "CVE-2021-40036" }, { "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "db": "CNNVD", "id": "CNNVD-202201-275" }, { "db": "NVD", "id": "CVE-2021-40036" } ] }, "id": "VAR-202201-1729", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401437" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:43.846000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177188" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-275" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401437" }, { "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "db": "NVD", "id": "CVE-2021-40036" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40036" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40036/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401437" }, { "db": "VULMON", "id": "CVE-2021-40036" }, { "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "db": "CNNVD", "id": "CNNVD-202201-275" }, { "db": "NVD", "id": "CVE-2021-40036" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401437" }, { "db": "VULMON", "id": "CVE-2021-40036" }, { "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "db": "CNNVD", "id": "CNNVD-202201-275" }, { "db": "NVD", "id": "CVE-2021-40036" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-401437" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-40036" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-275" }, { "date": "2022-06-13T18:15:09.740000", "db": "NVD", "id": "CVE-2021-40036" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-401437" }, { "date": "2022-06-27T00:00:00", "db": "VULMON", "id": "CVE-2021-40036" }, { "date": "2023-08-25T08:15:00", "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "date": "2022-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-275" }, { "date": "2022-06-27T16:39:48.947000", "db": "NVD", "id": "CVE-2021-40036" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-275" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019920" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-275" } ], "trust": 0.6 } }
var-202205-0250
Vulnerability from variot
There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to cause a denial of service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0250", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" } ] }, "cve": "CVE-2022-29793", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-29793", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421302", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-29793", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29793", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29793", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-29793", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202205-2543", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421302", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-29793", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" }, { "db": "NVD", "id": "CVE-2022-29793" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to cause a denial of service", "sources": [ { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29793", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009628", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2543", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-57610", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421302", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29793", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" }, { "db": "NVD", "id": "CVE-2022-29793" } ] }, "id": "VAR-202205-0250", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421302" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:50.471000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193765" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2022-29793 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29793" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29793/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-29793" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" }, { "db": "NVD", "id": "CVE-2022-29793" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" }, { "db": "NVD", "id": "CVE-2022-29793" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421302" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29793" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2543" }, { "date": "2022-05-13T15:15:09.937000", "db": "NVD", "id": "CVE-2022-29793" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-10T00:00:00", "db": "VULHUB", "id": "VHN-421302" }, { "date": "2023-02-10T00:00:00", "db": "VULMON", "id": "CVE-2022-29793" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "date": "2022-06-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2543" }, { "date": "2023-02-10T16:46:32.607000", "db": "NVD", "id": "CVE-2022-29793" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2543" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009628" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2543" } ], "trust": 0.6 } }
var-202209-0142
Vulnerability from variot
The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions. Huawei of EMUI and HarmonyOS There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0142", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "NVD", "id": "CVE-2022-39009" } ] }, "cve": "CVE-2022-39009", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-39009", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39009", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-39009", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-39009", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202209-159", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "CNNVD", "id": "CNNVD-202209-159" }, { "db": "NVD", "id": "CVE-2022-39009" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions. Huawei of EMUI and HarmonyOS There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-39009" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "VULHUB", "id": "VHN-434776" }, { "db": "VULMON", "id": "CVE-2022-39009" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39009", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017585", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-159", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434776", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39009", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434776" }, { "db": "VULMON", "id": "CVE-2022-39009" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "CNNVD", "id": "CNNVD-202209-159" }, { "db": "NVD", "id": "CVE-2022-39009" } ] }, "id": "VAR-202209-0142", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434776" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:35.195000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=208614" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434776" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "NVD", "id": "CVE-2022-39009" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39009" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39009/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434776" }, { "db": "VULMON", "id": "CVE-2022-39009" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "CNNVD", "id": "CNNVD-202209-159" }, { "db": "NVD", "id": "CVE-2022-39009" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434776" }, { "db": "VULMON", "id": "CVE-2022-39009" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "CNNVD", "id": "CNNVD-202209-159" }, { "db": "NVD", "id": "CVE-2022-39009" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434776" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39009" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-159" }, { "date": "2022-09-16T18:15:18.250000", "db": "NVD", "id": "CVE-2022-39009" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434776" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39009" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-159" }, { "date": "2022-09-21T14:03:03.557000", "db": "NVD", "id": "CVE-2022-39009" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-159" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017585" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-159" } ], "trust": 0.6 } }
var-202211-0328
Vulnerability from variot
The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0328", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44558" } ] }, "cve": "CVE-2022-44558", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-44558", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44558", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202211-2123", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2123" }, { "db": "NVD", "id": "CVE-2022-44558" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation", "sources": [ { "db": "NVD", "id": "CVE-2022-44558" }, { "db": "VULHUB", "id": "VHN-441946" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44558", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2123", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441946", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441946" }, { "db": "CNNVD", "id": "CNNVD-202211-2123" }, { "db": "NVD", "id": "CVE-2022-44558" } ] }, "id": "VAR-202211-0328", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441946" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:22.771000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=214353" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441946" }, { "db": "NVD", "id": "CVE-2022-44558" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44558" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44558/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441946" }, { "db": "CNNVD", "id": "CNNVD-202211-2123" }, { "db": "NVD", "id": "CVE-2022-44558" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441946" }, { "db": "CNNVD", "id": "CNNVD-202211-2123" }, { "db": "NVD", "id": "CVE-2022-44558" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441946" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2123" }, { "date": "2022-11-09T21:15:18.670000", "db": "NVD", "id": "CVE-2022-44558" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441946" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2123" }, { "date": "2022-11-14T19:09:40.857000", "db": "NVD", "id": "CVE-2022-44558" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2123" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Code problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2123" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2123" } ], "trust": 0.6 } }
var-202208-0562
Vulnerability from variot
The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0562", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" } ] }, "cve": "CVE-2022-37007", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-37007", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37007", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-37007", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-37007", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202208-2402", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" }, { "db": "NVD", "id": "CVE-2022-37007" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "VULHUB", "id": "VHN-427491" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37007", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-014549", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2402", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427491", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" }, { "db": "NVD", "id": "CVE-2022-37007" } ] }, "id": "VAR-202208-0562", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427491" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:36.316000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=204372" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37007" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37007/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" }, { "db": "NVD", "id": "CVE-2022-37007" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" }, { "db": "NVD", "id": "CVE-2022-37007" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427491" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2402" }, { "date": "2022-08-10T20:16:04.797000", "db": "NVD", "id": "CVE-2022-37007" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427491" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2402" }, { "date": "2022-08-15T17:59:09.927000", "db": "NVD", "id": "CVE-2022-37007" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2402" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014549" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2402" } ], "trust": 0.6 } }
var-202205-0436
Vulnerability from variot
The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access. Huawei of EMUI , Magic UI , HarmonyOS Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS kernel
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0436", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" } ] }, "cve": "CVE-2021-46786", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-46786", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-419298", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-46786", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46786", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46786", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-46786", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202205-2554", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-419298", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" }, { "db": "NVD", "id": "CVE-2021-46786" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access. Huawei of EMUI , Magic UI , HarmonyOS Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS kernel", "sources": [ { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46786", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009694", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2554", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-47650", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-419298", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46786", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" }, { "db": "NVD", "id": "CVE-2021-46786" } ] }, "id": "VAR-202205-0436", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419298" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:38.103000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193775" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46786" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46786/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" }, { "db": "NVD", "id": "CVE-2021-46786" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" }, { "db": "NVD", "id": "CVE-2021-46786" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419298" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46786" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2554" }, { "date": "2022-05-13T15:15:08.467000", "db": "NVD", "id": "CVE-2021-46786" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-419298" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46786" }, { "date": "2023-08-07T08:16:00", "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2554" }, { "date": "2022-05-23T18:48:58.757000", "db": "NVD", "id": "CVE-2021-46786" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2554" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009694" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2554" } ], "trust": 0.6 } }
var-202203-0968
Vulnerability from variot
There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0968", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" } ] }, "cve": "CVE-2021-40049", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40049", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401450", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40049", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40049", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40049", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40049", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202203-991", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401450", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "CNNVD", "id": "CNNVD-202203-991" }, { "db": "NVD", "id": "CVE-2021-40049" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "VULHUB", "id": "VHN-401450" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40049", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018715", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-991", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401450", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "CNNVD", "id": "CNNVD-202203-991" }, { "db": "NVD", "id": "CVE-2021-40049" } ] }, "id": "VAR-202203-0968", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401450" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:49.567000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI and Honor Magic Ui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=186015" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40049" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40049/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "CNNVD", "id": "CNNVD-202203-991" }, { "db": "NVD", "id": "CVE-2021-40049" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "CNNVD", "id": "CNNVD-202203-991" }, { "db": "NVD", "id": "CVE-2021-40049" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401450" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-991" }, { "date": "2022-03-10T17:43:17.500000", "db": "NVD", "id": "CVE-2021-40049" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401450" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-991" }, { "date": "2022-03-14T15:36:29.610000", "db": "NVD", "id": "CVE-2021-40049" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-991" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018715" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-991" } ], "trust": 0.6 } }
var-202112-0256
Vulnerability from variot
There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to restart the phone. Huawei Smartphones contain an array index validation vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0256", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "NVD", "id": "CVE-2021-37057" } ] }, "cve": "CVE-2021-37057", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37057", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398890", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37057", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37057", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37057", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37057", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2045", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398890", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398890" }, { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "CNNVD", "id": "CNNVD-202109-2045" }, { "db": "NVD", "id": "CVE-2021-37057" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to restart the phone. Huawei Smartphones contain an array index validation vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37057" }, { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "VULHUB", "id": "VHN-398890" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37057", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015756", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2045", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398890", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398890" }, { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "CNNVD", "id": "CNNVD-202109-2045" }, { "db": "NVD", "id": "CVE-2021-37057" } ] }, "id": "VAR-202112-0256", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398890" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:42:41.647000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173230" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "CNNVD", "id": "CNNVD-202109-2045" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-129", "trust": 1.1 }, { "problemtype": "Improper validation of array indexes (CWE-129) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398890" }, { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "NVD", "id": "CVE-2021-37057" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37057" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398890" }, { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "CNNVD", "id": "CNNVD-202109-2045" }, { "db": "NVD", "id": "CVE-2021-37057" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398890" }, { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "CNNVD", "id": "CNNVD-202109-2045" }, { "db": "NVD", "id": "CVE-2021-37057" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398890" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2045" }, { "date": "2021-12-07T17:15:08.467000", "db": "NVD", "id": "CVE-2021-37057" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398890" }, { "date": "2022-11-30T01:24:00", "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2045" }, { "date": "2021-12-09T17:40:58.033000", "db": "NVD", "id": "CVE-2021-37057" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2045" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to array index validation in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015756" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2045" } ], "trust": 0.6 } }
var-202205-0481
Vulnerability from variot
The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0481", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "NVD", "id": "CVE-2022-29796" } ] }, "cve": "CVE-2022-29796", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-29796", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421305", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-29796", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29796", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29796", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-29796", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202205-2548", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421305", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421305" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "CNNVD", "id": "CNNVD-202205-2548" }, { "db": "NVD", "id": "CVE-2022-29796" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-29796" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "VULHUB", "id": "VHN-421305" }, { "db": "VULMON", "id": "CVE-2022-29796" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29796", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009625", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2548", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-53574", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421305", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29796", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421305" }, { "db": "VULMON", "id": "CVE-2022-29796" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "CNNVD", "id": "CNNVD-202205-2548" }, { "db": "NVD", "id": "CVE-2022-29796" } ] }, "id": "VAR-202205-0481", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421305" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:21:49.925000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193769" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "NVD", "id": "CVE-2022-29796" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29796" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29796/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421305" }, { "db": "VULMON", "id": "CVE-2022-29796" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "CNNVD", "id": "CNNVD-202205-2548" }, { "db": "NVD", "id": "CVE-2022-29796" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421305" }, { "db": "VULMON", "id": "CVE-2022-29796" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "CNNVD", "id": "CNNVD-202205-2548" }, { "db": "NVD", "id": "CVE-2022-29796" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421305" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29796" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2548" }, { "date": "2022-05-13T15:15:10.080000", "db": "NVD", "id": "CVE-2022-29796" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421305" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29796" }, { "date": "2023-08-07T08:13:00", "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2548" }, { "date": "2022-05-23T18:39:16.137000", "db": "NVD", "id": "CVE-2022-29796" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2548" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009625" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2548" } ], "trust": 0.6 } }
var-202204-1557
Vulnerability from variot
The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in a permission management vulnerability.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1557", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" } ] }, "cve": "CVE-2022-22257", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-22257", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409786", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-22257", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22257", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-22257", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-22257", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202204-2023", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409786", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22257", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" }, { "db": "NVD", "id": "CVE-2022-22257" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in a permission management vulnerability.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22257", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007943", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2023", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-52825", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409786", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22257", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" }, { "db": "NVD", "id": "CVE-2022-22257" } ] }, "id": "VAR-202204-1557", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409786" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:24.244000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=189780" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22257" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22257/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/269.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" }, { "db": "NVD", "id": "CVE-2022-22257" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" }, { "db": "NVD", "id": "CVE-2022-22257" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409786" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22257" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2023" }, { "date": "2022-04-11T20:15:19.703000", "db": "NVD", "id": "CVE-2022-22257" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-18T00:00:00", "db": "VULHUB", "id": "VHN-409786" }, { "date": "2022-04-18T00:00:00", "db": "VULMON", "id": "CVE-2022-22257" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2023" }, { "date": "2022-04-18T18:13:50.083000", "db": "NVD", "id": "CVE-2022-22257" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2023" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product permission management vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007943" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2023" } ], "trust": 0.6 } }
var-202210-0127
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0127", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "NVD", "id": "CVE-2022-41593" } ] }, "cve": "CVE-2022-41593", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "id": "CVE-2022-41593", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41593", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41593", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2022-41593", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202210-157", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "CNNVD", "id": "CNNVD-202210-157" }, { "db": "NVD", "id": "CVE-2022-41593" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41593" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "VULHUB", "id": "VHN-437831" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41593", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018793", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-157", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437831", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437831" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "CNNVD", "id": "CNNVD-202210-157" }, { "db": "NVD", "id": "CVE-2022-41593" } ] }, "id": "VAR-202210-0127", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437831" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:21:37.390000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210791" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437831" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "NVD", "id": "CVE-2022-41593" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41593" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41593/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437831" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "CNNVD", "id": "CNNVD-202210-157" }, { "db": "NVD", "id": "CVE-2022-41593" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437831" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "CNNVD", "id": "CNNVD-202210-157" }, { "db": "NVD", "id": "CVE-2022-41593" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437831" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-157" }, { "date": "2022-10-14T16:15:26.613000", "db": "NVD", "id": "CVE-2022-41593" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437831" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-157" }, { "date": "2022-10-15T01:52:41.003000", "db": "NVD", "id": "CVE-2022-41593" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-157" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018793" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-157" } ], "trust": 0.6 } }
var-202112-0948
Vulnerability from variot
The cellular module has a vulnerability in permission management. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS There is a vulnerability in improper default permissions.Information may be obtained. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0948", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "NVD", "id": "CVE-2021-40004" } ] }, "cve": "CVE-2021-40004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40004", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-05174", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401405", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40004", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40004", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40004", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40004", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2022-05174", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202112-210", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401405", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "VULHUB", "id": "VHN-401405" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "CNNVD", "id": "CNNVD-202112-210" }, { "db": "NVD", "id": "CVE-2021-40004" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The cellular module has a vulnerability in permission management. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS There is a vulnerability in improper default permissions.Information may be obtained. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40004" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "VULHUB", "id": "VHN-401405" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40004", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017511", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05174", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-210", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401405", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "VULHUB", "id": "VHN-401405" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "CNNVD", "id": "CNNVD-202112-210" }, { "db": "NVD", "id": "CVE-2021-40004" } ] }, "id": "VAR-202112-0948", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "VULHUB", "id": "VHN-401405" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05174" } ] }, "last_update_date": "2024-08-14T14:55:43.928000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Huawei HarmonyOS Wearables Improper Permission Management Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/315081" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172734" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "CNNVD", "id": "CNNVD-202112-210" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401405" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "NVD", "id": "CVE-2021-40004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40004" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "VULHUB", "id": "VHN-401405" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "CNNVD", "id": "CNNVD-202112-210" }, { "db": "NVD", "id": "CVE-2021-40004" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "VULHUB", "id": "VHN-401405" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "CNNVD", "id": "CNNVD-202112-210" }, { "db": "NVD", "id": "CVE-2021-40004" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05174" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401405" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-210" }, { "date": "2022-01-10T14:10:21.140000", "db": "NVD", "id": "CVE-2021-40004" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05174" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401405" }, { "date": "2023-01-24T05:12:00", "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-210" }, { "date": "2022-01-13T15:53:05.357000", "db": "NVD", "id": "CVE-2021-40004" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-210" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability regarding improper default permissions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017511" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-210" } ], "trust": 0.6 } }
var-202302-0368
Vulnerability from variot
The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0368", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "NVD", "id": "CVE-2022-48288" } ] }, "cve": "CVE-2022-48288", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-48288", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48288", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48288", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-48288", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202302-349", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "CNNVD", "id": "CNNVD-202302-349" }, { "db": "NVD", "id": "CVE-2022-48288" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "VULHUB", "id": "VHN-453368" }, { "db": "VULMON", "id": "CVE-2022-48288" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48288", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003375", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-349", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453368", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48288", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453368" }, { "db": "VULMON", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "CNNVD", "id": "CNNVD-202302-349" }, { "db": "NVD", "id": "CVE-2022-48288" } ] }, "id": "VAR-202302-0368", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453368" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:18.982000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225750" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2022-48288 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453368" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "NVD", "id": "CVE-2022-48288" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48288" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48288/" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48288" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453368" }, { "db": "VULMON", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "CNNVD", "id": "CNNVD-202302-349" }, { "db": "NVD", "id": "CVE-2022-48288" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453368" }, { "db": "VULMON", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "CNNVD", "id": "CNNVD-202302-349" }, { "db": "NVD", "id": "CVE-2022-48288" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453368" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48288" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-349" }, { "date": "2023-02-09T17:15:12.650000", "db": "NVD", "id": "CVE-2022-48288" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453368" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48288" }, { "date": "2023-09-07T01:46:00", "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-349" }, { "date": "2023-02-16T14:17:00.243000", "db": "NVD", "id": "CVE-2022-48288" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-349" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003375" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-349" } ], "trust": 0.6 } }
var-202112-0245
Vulnerability from variot
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0245", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "NVD", "id": "CVE-2021-37070" } ] }, "cve": "CVE-2021-37070", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37070", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398904", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37070", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37070", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37070", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37070", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2011", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398904", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398904" }, { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "CNNVD", "id": "CNNVD-202109-2011" }, { "db": "NVD", "id": "CVE-2021-37070" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37070" }, { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "VULHUB", "id": "VHN-398904" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37070", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015979", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2011", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398904", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398904" }, { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "CNNVD", "id": "CNNVD-202109-2011" }, { "db": "NVD", "id": "CVE-2021-37070" } ] }, "id": "VAR-202112-0245", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398904" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:44.276000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173490" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "CNNVD", "id": "CNNVD-202109-2011" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398904" }, { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "NVD", "id": "CVE-2021-37070" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37070" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398904" }, { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "CNNVD", "id": "CNNVD-202109-2011" }, { "db": "NVD", "id": "CVE-2021-37070" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398904" }, { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "CNNVD", "id": "CNNVD-202109-2011" }, { "db": "NVD", "id": "CVE-2021-37070" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398904" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2011" }, { "date": "2021-12-07T17:15:08.963000", "db": "NVD", "id": "CVE-2021-37070" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398904" }, { "date": "2022-12-05T02:58:00", "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2011" }, { "date": "2021-12-09T17:37:53.523000", "db": "NVD", "id": "CVE-2021-37070" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2011" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015979" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2011" } ], "trust": 0.6 } }
var-202112-0334
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0334", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" } ] }, "cve": "CVE-2021-37021", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37021", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398854", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37021", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37021", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37021", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37021", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2052", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398854", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" }, { "db": "NVD", "id": "CVE-2021-37021" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "VULHUB", "id": "VHN-398854" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37021", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015759", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2052", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398854", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" }, { "db": "NVD", "id": "CVE-2021-37021" } ] }, "id": "VAR-202112-0334", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398854" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:29.652000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173232" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37021" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" }, { "db": "NVD", "id": "CVE-2021-37021" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" }, { "db": "NVD", "id": "CVE-2021-37021" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398854" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2052" }, { "date": "2021-12-07T17:15:08.343000", "db": "NVD", "id": "CVE-2021-37021" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398854" }, { "date": "2022-11-30T01:39:00", "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2052" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37021" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2052" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015759" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2052" } ], "trust": 0.6 } }
var-202201-1727
Vulnerability from variot
The eID module has a vulnerability that causes the memory to be used without being initialized,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Has an initialization vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1727", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "NVD", "id": "CVE-2021-40025" } ] }, "cve": "CVE-2021-40025", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40025", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401426", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40025", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40025", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40025", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40025", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202201-277", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401426", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401426" }, { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "CNNVD", "id": "CNNVD-202201-277" }, { "db": "NVD", "id": "CVE-2021-40025" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The eID module has a vulnerability that causes the memory to be used without being initialized,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Has an initialization vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40025" }, { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "VULHUB", "id": "VHN-401426" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40025", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002900", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-277", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401426", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401426" }, { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "CNNVD", "id": "CNNVD-202201-277" }, { "db": "NVD", "id": "CVE-2021-40025" } ] }, "id": "VAR-202201-1727", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401426" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:43.873000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177996" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "CNNVD", "id": "CNNVD-202201-277" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-665", "trust": 1.1 }, { "problemtype": "Improper initialization (CWE-665) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401426" }, { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "NVD", "id": "CVE-2021-40025" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40025" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401426" }, { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "CNNVD", "id": "CNNVD-202201-277" }, { "db": "NVD", "id": "CVE-2021-40025" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401426" }, { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "CNNVD", "id": "CNNVD-202201-277" }, { "db": "NVD", "id": "CVE-2021-40025" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401426" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-277" }, { "date": "2022-01-10T14:10:21.710000", "db": "NVD", "id": "CVE-2021-40025" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401426" }, { "date": "2023-01-25T08:42:00", "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-277" }, { "date": "2022-01-13T03:22:10.053000", "db": "NVD", "id": "CVE-2021-40025" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-277" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Initialization vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002900" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-277" } ], "trust": 0.6 } }
var-202204-1425
Vulnerability from variot
The application framework has a common DoS vulnerability.Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from the failure to properly process the input error message, and an attacker can exploit this vulnerability to cause a denial of service for the application
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1425", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "NVD", "id": "CVE-2022-22255" } ] }, "cve": "CVE-2022-22255", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-22255", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409784", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-22255", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22255", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-22255", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-22255", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202204-2035", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409784", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22255", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "CNNVD", "id": "CNNVD-202204-2035" }, { "db": "NVD", "id": "CVE-2022-22255" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The application framework has a common DoS vulnerability.Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from the failure to properly process the input error message, and an attacker can exploit this vulnerability to cause a denial of service for the application", "sources": [ { "db": "NVD", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22255", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007944", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2035", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44620", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409784", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22255", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "CNNVD", "id": "CNNVD-202204-2035" }, { "db": "NVD", "id": "CVE-2022-22255" } ] }, "id": "VAR-202204-1425", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409784" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:54.070000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=189782" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "NVD", "id": "CVE-2022-22255" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22255" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22255/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "CNNVD", "id": "CNNVD-202204-2035" }, { "db": "NVD", "id": "CVE-2022-22255" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "CNNVD", "id": "CNNVD-202204-2035" }, { "db": "NVD", "id": "CVE-2022-22255" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409784" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22255" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2035" }, { "date": "2022-04-11T20:15:19.613000", "db": "NVD", "id": "CVE-2022-22255" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-18T00:00:00", "db": "VULHUB", "id": "VHN-409784" }, { "date": "2022-04-18T00:00:00", "db": "VULMON", "id": "CVE-2022-22255" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2035" }, { "date": "2022-04-18T20:56:42.180000", "db": "NVD", "id": "CVE-2022-22255" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2035" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007944" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2035" } ], "trust": 0.6 } }
var-202212-0557
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0557", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "NVD", "id": "CVE-2022-46323" } ] }, "cve": "CVE-2022-46323", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-46323", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46323", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46323", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-46323", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202212-2524", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "CNNVD", "id": "CNNVD-202212-2524" }, { "db": "NVD", "id": "CVE-2022-46323" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46323" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "VULHUB", "id": "VHN-444293" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46323", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024020", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2524", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444293", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444293" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "CNNVD", "id": "CNNVD-202212-2524" }, { "db": "NVD", "id": "CVE-2022-46323" } ] }, "id": "VAR-202212-0557", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444293" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:37:09.392000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218962" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444293" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "NVD", "id": "CVE-2022-46323" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46323" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46323/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444293" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "CNNVD", "id": "CNNVD-202212-2524" }, { "db": "NVD", "id": "CVE-2022-46323" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444293" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "CNNVD", "id": "CNNVD-202212-2524" }, { "db": "NVD", "id": "CVE-2022-46323" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444293" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2524" }, { "date": "2022-12-20T21:15:11.787000", "db": "NVD", "id": "CVE-2022-46323" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444293" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2524" }, { "date": "2022-12-24T04:17:37.283000", "db": "NVD", "id": "CVE-2022-46323" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2524" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024020" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2524" } ], "trust": 0.6 } }
var-202207-0068
Vulnerability from variot
The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0068", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" } ] }, "cve": "CVE-2022-34742", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-34742", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-427079", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-34742", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-34742", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-34742", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-34742", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202207-414", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427079", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34742", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "CNNVD", "id": "CNNVD-202207-414" }, { "db": "NVD", "id": "CVE-2022-34742" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34742", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013198", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-414", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-61608", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427079", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34742", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "CNNVD", "id": "CNNVD-202207-414" }, { "db": "NVD", "id": "CVE-2022-34742" } ] }, "id": "VAR-202207-0068", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427079" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:40.795000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=200888" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34742" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34742/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "CNNVD", "id": "CNNVD-202207-414" }, { "db": "NVD", "id": "CVE-2022-34742" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "CNNVD", "id": "CNNVD-202207-414" }, { "db": "NVD", "id": "CVE-2022-34742" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427079" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34742" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-414" }, { "date": "2022-07-12T14:15:19.533000", "db": "NVD", "id": "CVE-2022-34742" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-12T00:00:00", "db": "VULHUB", "id": "VHN-427079" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34742" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-414" }, { "date": "2022-12-12T21:08:43.917000", "db": "NVD", "id": "CVE-2022-34742" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-414" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013198" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-414" } ], "trust": 0.6 } }
var-202302-0469
Vulnerability from variot
The HwContacts module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data integrity. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0469", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "NVD", "id": "CVE-2022-48287" } ] }, "cve": "CVE-2022-48287", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-48287", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-48287", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48287", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-48287", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202302-341", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "CNNVD", "id": "CNNVD-202302-341" }, { "db": "NVD", "id": "CVE-2022-48287" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwContacts module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data integrity. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "VULHUB", "id": "VHN-453367" }, { "db": "VULMON", "id": "CVE-2022-48287" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48287", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003374", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-341", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453367", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48287", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453367" }, { "db": "VULMON", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "CNNVD", "id": "CNNVD-202302-341" }, { "db": "NVD", "id": "CVE-2022-48287" } ] }, "id": "VAR-202302-0469", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453367" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:17:24.654000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225743" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2022-48287 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "NVD", "id": "CVE-2022-48287" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48287" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48287/" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48287" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453367" }, { "db": "VULMON", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "CNNVD", "id": "CNNVD-202302-341" }, { "db": "NVD", "id": "CVE-2022-48287" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453367" }, { "db": "VULMON", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "CNNVD", "id": "CNNVD-202302-341" }, { "db": "NVD", "id": "CVE-2022-48287" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453367" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48287" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-341" }, { "date": "2023-02-09T17:15:12.450000", "db": "NVD", "id": "CVE-2022-48287" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453367" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48287" }, { "date": "2023-09-07T01:26:00", "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-341" }, { "date": "2023-02-16T14:20:03.613000", "db": "NVD", "id": "CVE-2022-48287" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-341" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003374" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-341" } ], "trust": 0.6 } }
var-202111-1771
Vulnerability from variot
The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1771", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "NVD", "id": "CVE-2021-39977" } ] }, "cve": "CVE-2021-39977", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-39977", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401378", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-39977", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39977", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39977", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39977", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-2129", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401378", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-39977", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401378" }, { "db": "VULMON", "id": "CVE-2021-39977" }, { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "CNNVD", "id": "CNNVD-202111-2129" }, { "db": "NVD", "id": "CVE-2021-39977" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart", "sources": [ { "db": "NVD", "id": "CVE-2021-39977" }, { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "VULHUB", "id": "VHN-401378" }, { "db": "VULMON", "id": "CVE-2021-39977" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39977", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017595", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2129", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401378", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39977", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401378" }, { "db": "VULMON", "id": "CVE-2021-39977" }, { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "CNNVD", "id": "CNNVD-202111-2129" }, { "db": "NVD", "id": "CVE-2021-39977" } ] }, "id": "VAR-202111-1771", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401378" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:45.770000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176790" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "CNNVD", "id": "CNNVD-202111-2129" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401378" }, { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "NVD", "id": "CVE-2021-39977" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39977" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/476.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401378" }, { "db": "VULMON", "id": "CVE-2021-39977" }, { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "CNNVD", "id": "CNNVD-202111-2129" }, { "db": "NVD", "id": "CVE-2021-39977" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401378" }, { "db": "VULMON", "id": "CVE-2021-39977" }, { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "CNNVD", "id": "CNNVD-202111-2129" }, { "db": "NVD", "id": "CVE-2021-39977" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401378" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39977" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2129" }, { "date": "2022-01-03T22:15:10.427000", "db": "NVD", "id": "CVE-2021-39977" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401378" }, { "date": "2022-01-13T00:00:00", "db": "VULMON", "id": "CVE-2021-39977" }, { "date": "2023-01-27T06:30:00", "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2129" }, { "date": "2022-01-13T15:59:36.237000", "db": "NVD", "id": "CVE-2021-39977" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2129" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017595" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2129" } ], "trust": 0.6 } }
var-202206-0025
Vulnerability from variot
The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in a format string vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0025", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" } ] }, "cve": "CVE-2022-31753", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-31753", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423586", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-31753", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31753", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-31753", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-31753", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202206-469", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423586", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31753", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "CNNVD", "id": "CNNVD-202206-469" }, { "db": "NVD", "id": "CVE-2022-31753" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in a format string vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31753", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012035", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-469", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66173", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423586", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31753", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "CNNVD", "id": "CNNVD-202206-469" }, { "db": "NVD", "id": "CVE-2022-31753" } ] }, "id": "VAR-202206-0025", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423586" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:22:12.663000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for formatting string error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=197630" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-134", "trust": 1.0 }, { "problemtype": "Format string problem (CWE-134) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31753" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31753/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/134.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "CNNVD", "id": "CNNVD-202206-469" }, { "db": "NVD", "id": "CVE-2022-31753" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "CNNVD", "id": "CNNVD-202206-469" }, { "db": "NVD", "id": "CVE-2022-31753" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423586" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31753" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-469" }, { "date": "2022-06-13T16:15:08.620000", "db": "NVD", "id": "CVE-2022-31753" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423586" }, { "date": "2022-06-27T00:00:00", "db": "VULMON", "id": "CVE-2022-31753" }, { "date": "2023-08-25T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "date": "2022-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-469" }, { "date": "2022-06-27T16:13:45.880000", "db": "NVD", "id": "CVE-2022-31753" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-469" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product Format String Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012035" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "format string error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-469" } ], "trust": 0.6 } }
var-202207-0112
Vulnerability from variot
The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by abnormal function when the card is activated
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0112", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" } ] }, "cve": "CVE-2022-34741", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CVE-2022-34741", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.9, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-427090", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2022-34741", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34741", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-34741", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-34741", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202207-396", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-427090", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-34741", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "CNNVD", "id": "CNNVD-202207-396" }, { "db": "NVD", "id": "CVE-2022-34741" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by abnormal function when the card is activated", "sources": [ { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34741", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013199", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-396", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52819", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427090", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34741", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "CNNVD", "id": "CNNVD-202207-396" }, { "db": "NVD", "id": "CVE-2022-34741" } ] }, "id": "VAR-202207-0112", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427090" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:22:03.805000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=199745" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34741" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34741/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "CNNVD", "id": "CNNVD-202207-396" }, { "db": "NVD", "id": "CVE-2022-34741" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "CNNVD", "id": "CNNVD-202207-396" }, { "db": "NVD", "id": "CVE-2022-34741" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427090" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34741" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-396" }, { "date": "2022-07-12T14:15:19.493000", "db": "NVD", "id": "CVE-2022-34741" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427090" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34741" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-396" }, { "date": "2022-07-19T14:10:47.477000", "db": "NVD", "id": "CVE-2022-34741" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-396" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013199" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-396" } ], "trust": 0.6 } }
var-202204-1426
Vulnerability from variot
The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Huawei HarmonyOS DFX module has a reuse-after-free vulnerability. This vulnerability stems from the confusion of the instructions responsible for releasing memory in the DFX module
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1426", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22252" } ] }, "cve": "CVE-2022-22252", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-22252", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409781", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-22252", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-22252", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2031", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409781", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-22252", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Huawei HarmonyOS DFX module has a reuse-after-free vulnerability. This vulnerability stems from the confusion of the instructions responsible for releasing memory in the DFX module", "sources": [ { "db": "NVD", "id": "CVE-2022-22252" }, { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22252", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2031", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44624", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409781", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22252", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "id": "VAR-202204-1426", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409781" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:13.734000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194227" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-RCE " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22252/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-409781" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-22252" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "date": "2022-05-13T16:15:08.233000", "db": "NVD", "id": "CVE-2022-22252" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-26T00:00:00", "db": "VULHUB", "id": "VHN-409781" }, { "date": "2022-05-26T00:00:00", "db": "VULMON", "id": "CVE-2022-22252" }, { "date": "2022-05-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "date": "2022-05-26T15:19:28.540000", "db": "NVD", "id": "CVE-2022-22252" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2031" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI HarmonyOS Resource Management Error Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2031" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2031" } ], "trust": 0.6 } }
var-202208-0817
Vulnerability from variot
Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability. Huawei of EMUI and HarmonyOS There is a vulnerability in improper default permissions.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0817", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "NVD", "id": "CVE-2022-37006" } ] }, "cve": "CVE-2022-37006", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-37006", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37006", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-37006", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-37006", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202208-2745", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "CNNVD", "id": "CNNVD-202208-2745" }, { "db": "NVD", "id": "CVE-2022-37006" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability. Huawei of EMUI and HarmonyOS There is a vulnerability in improper default permissions.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android", "sources": [ { "db": "NVD", "id": "CVE-2022-37006" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "VULHUB", "id": "VHN-427596" }, { "db": "VULMON", "id": "CVE-2022-37006" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37006", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014550", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2745", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427596", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37006", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427596" }, { "db": "VULMON", "id": "CVE-2022-37006" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "CNNVD", "id": "CNNVD-202208-2745" }, { "db": "NVD", "id": "CVE-2022-37006" } ] }, "id": "VAR-202208-0817", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427596" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:02:28.997000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=204382" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427596" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "NVD", "id": "CVE-2022-37006" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37006" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37006/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427596" }, { "db": "VULMON", "id": "CVE-2022-37006" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "CNNVD", "id": "CNNVD-202208-2745" }, { "db": "NVD", "id": "CVE-2022-37006" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427596" }, { "db": "VULMON", "id": "CVE-2022-37006" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "CNNVD", "id": "CNNVD-202208-2745" }, { "db": "NVD", "id": "CVE-2022-37006" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427596" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37006" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2745" }, { "date": "2022-08-10T20:16:04.613000", "db": "NVD", "id": "CVE-2022-37006" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-27T00:00:00", "db": "VULHUB", "id": "VHN-427596" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37006" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2745" }, { "date": "2022-10-27T18:38:56.727000", "db": "NVD", "id": "CVE-2022-37006" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2745" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding improper default permissions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014550" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2745" } ], "trust": 0.6 } }
var-202210-0413
Vulnerability from variot
The HW_KEYMASTER module has an out-of-bounds access vulnerability in parameter set verification.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0413", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "NVD", "id": "CVE-2021-46840" } ] }, "cve": "CVE-2021-46840", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-46840", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46840", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46840", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-46840", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202210-168", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "CNNVD", "id": "CNNVD-202210-168" }, { "db": "NVD", "id": "CVE-2021-46840" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has an out-of-bounds access vulnerability in parameter set verification.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-46840" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "VULHUB", "id": "VHN-430151" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46840", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-019227", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-168", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430151", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430151" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "CNNVD", "id": "CNNVD-202210-168" }, { "db": "NVD", "id": "CVE-2021-46840" } ] }, "id": "VAR-202210-0413", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430151" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:32.014000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211150" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430151" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "NVD", "id": "CVE-2021-46840" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46840" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46840/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430151" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "CNNVD", "id": "CNNVD-202210-168" }, { "db": "NVD", "id": "CVE-2021-46840" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430151" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "CNNVD", "id": "CNNVD-202210-168" }, { "db": "NVD", "id": "CVE-2021-46840" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-430151" }, { "date": "2023-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-168" }, { "date": "2022-10-14T16:15:12.303000", "db": "NVD", "id": "CVE-2021-46840" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-430151" }, { "date": "2023-10-24T08:20:00", "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "date": "2022-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-168" }, { "date": "2022-10-18T18:39:27.537000", "db": "NVD", "id": "CVE-2021-46840" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-168" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019227" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-168" } ], "trust": 0.6 } }
var-202302-0346
Vulnerability from variot
The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0346", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "NVD", "id": "CVE-2022-48300" } ] }, "cve": "CVE-2022-48300", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-48300", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48300", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48300", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-48300", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202302-343", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "CNNVD", "id": "CNNVD-202302-343" }, { "db": "NVD", "id": "CVE-2022-48300" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48300" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "VULHUB", "id": "VHN-453380" }, { "db": "VULMON", "id": "CVE-2022-48300" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48300", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003403", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-343", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453380", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48300", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453380" }, { "db": "VULMON", "id": "CVE-2022-48300" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "CNNVD", "id": "CNNVD-202302-343" }, { "db": "NVD", "id": "CVE-2022-48300" } ] }, "id": "VAR-202302-0346", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453380" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:26:52.685000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225744" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453380" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "NVD", "id": "CVE-2022-48300" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48300" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48300/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453380" }, { "db": "VULMON", "id": "CVE-2022-48300" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "CNNVD", "id": "CNNVD-202302-343" }, { "db": "NVD", "id": "CVE-2022-48300" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453380" }, { "db": "VULMON", "id": "CVE-2022-48300" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "CNNVD", "id": "CNNVD-202302-343" }, { "db": "NVD", "id": "CVE-2022-48300" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453380" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48300" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-343" }, { "date": "2023-02-09T17:15:15.057000", "db": "NVD", "id": "CVE-2022-48300" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453380" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48300" }, { "date": "2023-09-07T03:09:00", "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-343" }, { "date": "2023-02-16T20:10:12.937000", "db": "NVD", "id": "CVE-2022-48300" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-343" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003403" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-343" } ], "trust": 0.6 } }
var-202207-0132
Vulnerability from variot
The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0132", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46741" } ] }, "cve": "CVE-2021-46741", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-46741", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-418650", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-46741", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46741", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-409", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418650", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46741", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" }, { "db": "NVD", "id": "CVE-2021-46741" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46741", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202207-409", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-57613", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-418650", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46741", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" }, { "db": "NVD", "id": "CVE-2021-46741" } ] }, "id": "VAR-202207-0132", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418650" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:00:55.135000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=200693" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46741" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46741/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" }, { "db": "NVD", "id": "CVE-2021-46741" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" }, { "db": "NVD", "id": "CVE-2021-46741" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-418650" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2021-46741" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-409" }, { "date": "2022-07-12T14:15:14.857000", "db": "NVD", "id": "CVE-2021-46741" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-12T00:00:00", "db": "VULHUB", "id": "VHN-418650" }, { "date": "2022-07-18T00:00:00", "db": "VULMON", "id": "CVE-2021-46741" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-409" }, { "date": "2022-12-12T21:08:02.043000", "db": "NVD", "id": "CVE-2021-46741" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ], "trust": 0.6 } }
var-202212-0613
Vulnerability from variot
The sensor privacy module has an authentication vulnerability. Successful exploitation of this vulnerability may cause unavailability of the smartphone's camera and microphone. Huawei of HarmonyOS There is an authentication vulnerability in.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0613", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "db": "NVD", "id": "CVE-2022-46313" } ] }, "cve": "CVE-2022-46313", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-46313", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46313", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46313", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-46313", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202212-2494", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "db": "CNNVD", "id": "CNNVD-202212-2494" }, { "db": "NVD", "id": "CVE-2022-46313" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The sensor privacy module has an authentication vulnerability. Successful exploitation of this vulnerability may cause unavailability of the smartphone\u0027s camera and microphone. Huawei of HarmonyOS There is an authentication vulnerability in.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46313" }, { "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "db": "VULHUB", "id": "VHN-444283" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46313", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023886", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2494", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444283", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444283" }, { "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "db": "CNNVD", "id": "CNNVD-202212-2494" }, { "db": "NVD", "id": "CVE-2022-46313" } ] }, "id": "VAR-202212-0613", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444283" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:20.906000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218950" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2494" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444283" }, { "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "db": "NVD", "id": "CVE-2022-46313" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46313" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46313/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444283" }, { "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "db": "CNNVD", "id": "CNNVD-202212-2494" }, { "db": "NVD", "id": "CVE-2022-46313" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444283" }, { "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "db": "CNNVD", "id": "CNNVD-202212-2494" }, { "db": "NVD", "id": "CVE-2022-46313" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444283" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2494" }, { "date": "2022-12-20T21:15:11.300000", "db": "NVD", "id": "CVE-2022-46313" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444283" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2494" }, { "date": "2022-12-24T04:14:51.410000", "db": "NVD", "id": "CVE-2022-46313" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2494" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023886" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2494" } ], "trust": 0.6 } }
var-202205-0437
Vulnerability from variot
The frame scheduling module has a Use After Free (UAF) vulnerability.Successful exploitation of this vulnerability will affect data integrity, availability, and confidentiality. Huawei of EMUI and HarmonyOS Exists in a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS kernel
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0437", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "NVD", "id": "CVE-2022-29794" } ] }, "cve": "CVE-2022-29794", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-29794", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-421303", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-29794", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-29794", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29794", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-29794", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202205-2552", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-421303", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "CNNVD", "id": "CNNVD-202205-2552" }, { "db": "NVD", "id": "CVE-2022-29794" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The frame scheduling module has a Use After Free (UAF) vulnerability.Successful exploitation of this vulnerability will affect data integrity, availability, and confidentiality. Huawei of EMUI and HarmonyOS Exists in a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS kernel", "sources": [ { "db": "NVD", "id": "CVE-2022-29794" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "VULHUB", "id": "VHN-421303" }, { "db": "VULMON", "id": "CVE-2022-29794" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29794", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009627", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2552", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-47652", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421303", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29794", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "VULMON", "id": "CVE-2022-29794" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "CNNVD", "id": "CNNVD-202205-2552" }, { "db": "NVD", "id": "CVE-2022-29794" } ] }, "id": "VAR-202205-0437", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421303" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:50.295000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193773" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "NVD", "id": "CVE-2022-29794" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29794" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29794/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "VULMON", "id": "CVE-2022-29794" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "CNNVD", "id": "CNNVD-202205-2552" }, { "db": "NVD", "id": "CVE-2022-29794" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "VULMON", "id": "CVE-2022-29794" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "CNNVD", "id": "CNNVD-202205-2552" }, { "db": "NVD", "id": "CVE-2022-29794" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421303" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29794" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2552" }, { "date": "2022-05-13T15:15:09.980000", "db": "NVD", "id": "CVE-2022-29794" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421303" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29794" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2552" }, { "date": "2022-05-23T18:40:33.860000", "db": "NVD", "id": "CVE-2022-29794" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2552" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009627" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2552" } ], "trust": 0.6 } }
var-202212-0449
Vulnerability from variot
The multi-screen collaboration module has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in a past traversal vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0449", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "NVD", "id": "CVE-2021-46856" } ] }, "cve": "CVE-2021-46856", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-46856", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46856", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46856", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-46856", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202212-2490", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" }, { "db": "NVD", "id": "CVE-2021-46856" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The multi-screen collaboration module has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in a past traversal vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-46856" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "VULHUB", "id": "VHN-430164" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46856", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-003430", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2490", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430164", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430164" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" }, { "db": "NVD", "id": "CVE-2021-46856" } ] }, "id": "VAR-202212-0449", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430164" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:00:37.897000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0January\u00a02023", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=219372" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430164" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "NVD", "id": "CVE-2021-46856" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46856" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46856/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430164" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" }, { "db": "NVD", "id": "CVE-2021-46856" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430164" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" }, { "db": "NVD", "id": "CVE-2021-46856" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-430164" }, { "date": "2023-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2490" }, { "date": "2022-12-20T21:15:10.427000", "db": "NVD", "id": "CVE-2021-46856" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-09T00:00:00", "db": "VULHUB", "id": "VHN-430164" }, { "date": "2023-02-17T01:53:00", "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "date": "2023-01-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2490" }, { "date": "2023-11-07T03:40:05.423000", "db": "NVD", "id": "CVE-2021-46856" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2490" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003430" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2490" } ], "trust": 0.6 } }
var-202108-0281
Vulnerability from variot
A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Memory Leakage. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0281", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "NVD", "id": "CVE-2021-22417" } ] }, "cve": "CVE-2021-22417", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22417", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380852", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22417", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22417", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22417", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22417", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202108-332", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380852", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22417", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380852" }, { "db": "VULMON", "id": "CVE-2021-22417" }, { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "CNNVD", "id": "CNNVD-202108-332" }, { "db": "NVD", "id": "CVE-2021-22417" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Memory Leakage. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22417" }, { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "VULHUB", "id": "VHN-380852" }, { "db": "VULMON", "id": "CVE-2021-22417" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22417", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009380", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-332", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380852", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22417", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380852" }, { "db": "VULMON", "id": "CVE-2021-22417" }, { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "CNNVD", "id": "CNNVD-202108-332" }, { "db": "NVD", "id": "CVE-2021-22417" } ] }, "id": "VAR-202108-0281", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380852" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:23:28.394000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=159656" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "CNNVD", "id": "CNNVD-202108-332" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "NVD", "id": "CVE-2021-22417" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22417" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380852" }, { "db": "VULMON", "id": "CVE-2021-22417" }, { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "CNNVD", "id": "CNNVD-202108-332" }, { "db": "NVD", "id": "CVE-2021-22417" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380852" }, { "db": "VULMON", "id": "CVE-2021-22417" }, { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "CNNVD", "id": "CNNVD-202108-332" }, { "db": "NVD", "id": "CVE-2021-22417" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380852" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22417" }, { "date": "2022-04-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-332" }, { "date": "2021-08-03T18:15:08.013000", "db": "NVD", "id": "CVE-2021-22417" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-380852" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22417" }, { "date": "2022-04-22T06:22:00", "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-332" }, { "date": "2021-08-11T13:24:43.200000", "db": "NVD", "id": "CVE-2021-22417" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-332" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009380" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-332" } ], "trust": 0.6 } }
var-202111-0876
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0876", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "NVD", "id": "CVE-2021-37017" } ] }, "cve": "CVE-2021-37017", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37017", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398849", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37017", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37017", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37017", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37017", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1884", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398849", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398849" }, { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "CNNVD", "id": "CNNVD-202111-1884" }, { "db": "NVD", "id": "CVE-2021-37017" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37017" }, { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "VULHUB", "id": "VHN-398849" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37017", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015582", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1884", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398849", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398849" }, { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "CNNVD", "id": "CNNVD-202111-1884" }, { "db": "NVD", "id": "CVE-2021-37017" } ] }, "id": "VAR-202111-0876", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398849" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:11:11.599000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172183" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "CNNVD", "id": "CNNVD-202111-1884" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398849" }, { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "NVD", "id": "CVE-2021-37017" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37017" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398849" }, { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "CNNVD", "id": "CNNVD-202111-1884" }, { "db": "NVD", "id": "CVE-2021-37017" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398849" }, { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "CNNVD", "id": "CNNVD-202111-1884" }, { "db": "NVD", "id": "CVE-2021-37017" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398849" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1884" }, { "date": "2021-11-23T16:15:09.327000", "db": "NVD", "id": "CVE-2021-37017" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398849" }, { "date": "2022-11-24T08:57:00", "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1884" }, { "date": "2021-11-29T19:00:04.273000", "db": "NVD", "id": "CVE-2021-37017" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1884" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015582" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1884" } ], "trust": 0.6 } }
var-202110-1459
Vulnerability from variot
A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause core dump. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1459", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "NVD", "id": "CVE-2021-22454" } ] }, "cve": "CVE-2021-22454", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22454", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380889", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22454", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22454", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22454", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22454", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2044", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380889", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380889" }, { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "CNNVD", "id": "CNNVD-202110-2044" }, { "db": "NVD", "id": "CVE-2021-22454" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause core dump. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22454" }, { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "VULHUB", "id": "VHN-380889" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22454", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014242", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2044", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380889", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380889" }, { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "CNNVD", "id": "CNNVD-202110-2044" }, { "db": "NVD", "id": "CVE-2021-22454" } ] }, "id": "VAR-202110-1459", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380889" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:38.970000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171470" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "CNNVD", "id": "CNNVD-202110-2044" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.1 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-674", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380889" }, { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "NVD", "id": "CVE-2021-22454" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22454" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380889" }, { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "CNNVD", "id": "CNNVD-202110-2044" }, { "db": "NVD", "id": "CVE-2021-22454" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380889" }, { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "CNNVD", "id": "CNNVD-202110-2044" }, { "db": "NVD", "id": "CVE-2021-22454" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380889" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2044" }, { "date": "2021-10-28T13:15:08.987000", "db": "NVD", "id": "CVE-2021-22454" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-380889" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2044" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-22454" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2044" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in leaking resources to the wrong area in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014242" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2044" } ], "trust": 0.6 } }
var-202106-1796
Vulnerability from variot
A component of the HarmonyOS has a Privilege Dropping / Lowering Errors vulnerability. Local attackers may exploit this vulnerability to obtain Kernel space read/write capability. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have a security flaw that stems from incorrect permission assignments. This vulnerability could affect service confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1796", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22326" } ] }, "cve": "CVE-2021-22326", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2021-22326", "impactScore": 9.2, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380761", "impactScore": 9.2, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22326", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22326", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22326", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-1981", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380761", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22326", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380761" }, { "db": "VULMON", "id": "CVE-2021-22326" }, { "db": "CNNVD", "id": "CNNVD-202106-1981" }, { "db": "NVD", "id": "CVE-2021-22326" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Privilege Dropping / Lowering Errors vulnerability. Local attackers may exploit this vulnerability to obtain Kernel space read/write capability. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have a security flaw that stems from incorrect permission assignments. This vulnerability could affect service confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-22326" }, { "db": "VULHUB", "id": "VHN-380761" }, { "db": "VULMON", "id": "CVE-2021-22326" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22326", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1981", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380761", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22326", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380761" }, { "db": "VULMON", "id": "CVE-2021-22326" }, { "db": "CNNVD", "id": "CNNVD-202106-1981" }, { "db": "NVD", "id": "CVE-2021-22326" } ] }, "id": "VAR-202106-1796", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380761" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:23:30.735000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=156065" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1981" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380761" }, { "db": "NVD", "id": "CVE-2021-22326" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/269.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380761" }, { "db": "VULMON", "id": "CVE-2021-22326" }, { "db": "CNNVD", "id": "CNNVD-202106-1981" }, { "db": "NVD", "id": "CVE-2021-22326" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380761" }, { "db": "VULMON", "id": "CVE-2021-22326" }, { "db": "CNNVD", "id": "CNNVD-202106-1981" }, { "db": "NVD", "id": "CVE-2021-22326" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380761" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22326" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1981" }, { "date": "2021-06-30T14:15:08.563000", "db": "NVD", "id": "CVE-2021-22326" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380761" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22326" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1981" }, { "date": "2021-11-02T19:19:27.707000", "db": "NVD", "id": "CVE-2021-22326" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1981" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1981" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1981" } ], "trust": 0.6 } }
var-202203-0260
Vulnerability from variot
There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability. Huawei of HarmonyOS , EMUI , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0260", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" } ] }, "cve": "CVE-2021-40052", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40052", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401453", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40052", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40052", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40052", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40052", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202203-984", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401453", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-40052", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "CNNVD", "id": "CNNVD-202203-984" }, { "db": "NVD", "id": "CVE-2021-40052" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability. Huawei of HarmonyOS , EMUI , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40052", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018712", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-984", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401453", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40052", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "CNNVD", "id": "CNNVD-202203-984" }, { "db": "NVD", "id": "CVE-2021-40052" } ] }, "id": "VAR-202203-0260", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401453" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:35.661000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=203865" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2021-40052 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.1 }, { "problemtype": "Miscalculation of buffer size (CWE-131) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40052" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40052/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/131.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2021-40052" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "CNNVD", "id": "CNNVD-202203-984" }, { "db": "NVD", "id": "CVE-2021-40052" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "CNNVD", "id": "CNNVD-202203-984" }, { "db": "NVD", "id": "CVE-2021-40052" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401453" }, { "date": "2022-03-10T00:00:00", "db": "VULMON", "id": "CVE-2021-40052" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-984" }, { "date": "2022-03-10T17:43:18.923000", "db": "NVD", "id": "CVE-2021-40052" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-19T00:00:00", "db": "VULHUB", "id": "VHN-401453" }, { "date": "2023-01-19T00:00:00", "db": "VULMON", "id": "CVE-2021-40052" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-984" }, { "date": "2023-01-19T03:30:20.603000", "db": "NVD", "id": "CVE-2021-40052" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-984" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer size miscalculation vulnerability in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018712" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-984" } ], "trust": 0.6 } }
var-202210-0122
Vulnerability from variot
The HIPP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0122", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38984" } ] }, "cve": "CVE-2022-38984", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38984", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38984", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-185", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-185" }, { "db": "NVD", "id": "CVE-2022-38984" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HIPP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-38984" }, { "db": "VULHUB", "id": "VHN-434763" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38984", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-185", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434763", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434763" }, { "db": "CNNVD", "id": "CNNVD-202210-185" }, { "db": "NVD", "id": "CVE-2022-38984" } ] }, "id": "VAR-202210-0122", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434763" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:17:41.419000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211161" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434763" }, { "db": "NVD", "id": "CVE-2022-38984" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38984/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434763" }, { "db": "CNNVD", "id": "CNNVD-202210-185" }, { "db": "NVD", "id": "CVE-2022-38984" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434763" }, { "db": "CNNVD", "id": "CNNVD-202210-185" }, { "db": "NVD", "id": "CVE-2022-38984" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434763" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-185" }, { "date": "2022-10-14T16:15:15.293000", "db": "NVD", "id": "CVE-2022-38984" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434763" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-185" }, { "date": "2022-10-18T15:04:27.097000", "db": "NVD", "id": "CVE-2022-38984" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-185" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-185" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-185" } ], "trust": 0.6 } }
var-202201-1715
Vulnerability from variot
There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI contains a double free vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1715", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" } ] }, "cve": "CVE-2021-40038", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40038", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401439", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40038", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40038", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40038", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40038", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202201-307", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401439", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-40038", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "CNNVD", "id": "CNNVD-202201-307" }, { "db": "NVD", "id": "CVE-2021-40038" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI contains a double free vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40038", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-002910", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-307", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401439", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40038", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "CNNVD", "id": "CNNVD-202201-307" }, { "db": "NVD", "id": "CVE-2021-40038" } ] }, "id": "VAR-202201-1715", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401439" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:59.695000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177453" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40038" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202201-0000001239056313" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/415.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "CNNVD", "id": "CNNVD-202201-307" }, { "db": "NVD", "id": "CVE-2021-40038" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "CNNVD", "id": "CNNVD-202201-307" }, { "db": "NVD", "id": "CVE-2021-40038" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401439" }, { "date": "2022-01-10T00:00:00", "db": "VULMON", "id": "CVE-2021-40038" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-307" }, { "date": "2022-01-10T14:10:22.707000", "db": "NVD", "id": "CVE-2021-40038" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401439" }, { "date": "2022-01-13T00:00:00", "db": "VULMON", "id": "CVE-2021-40038" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-307" }, { "date": "2022-01-13T15:38:03.063000", "db": "NVD", "id": "CVE-2021-40038" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-307" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product double free vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002910" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-307" } ], "trust": 0.6 } }
var-202211-0633
Vulnerability from variot
The kernel module has the vulnerability that the mapping is not cleared after the memory is automatically released. Successful exploitation of this vulnerability may cause a system restart. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0633", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "NVD", "id": "CVE-2022-44546" } ] }, "cve": "CVE-2022-44546", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-44546", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44546", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44546", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-44546", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202211-2139", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "CNNVD", "id": "CNNVD-202211-2139" }, { "db": "NVD", "id": "CVE-2022-44546" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has the vulnerability that the mapping is not cleared after the memory is automatically released. Successful exploitation of this vulnerability may cause a system restart. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44546" }, { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "VULHUB", "id": "VHN-441924" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44546", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020507", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2139", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441924", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441924" }, { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "CNNVD", "id": "CNNVD-202211-2139" }, { "db": "NVD", "id": "CVE-2022-44546" } ] }, "id": "VAR-202211-0633", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441924" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:12.752000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213976" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "NVD", "id": "CVE-2022-44546" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44546" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44546/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441924" }, { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "CNNVD", "id": "CNNVD-202211-2139" }, { "db": "NVD", "id": "CVE-2022-44546" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441924" }, { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "CNNVD", "id": "CNNVD-202211-2139" }, { "db": "NVD", "id": "CVE-2022-44546" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441924" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2139" }, { "date": "2022-11-09T21:15:17.930000", "db": "NVD", "id": "CVE-2022-44546" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441924" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2139" }, { "date": "2022-11-10T13:52:04.360000", "db": "NVD", "id": "CVE-2022-44546" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2139" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020507" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2139" } ], "trust": 0.6 } }
var-202201-1730
Vulnerability from variot
The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in an out-of-bounds write vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities. No detailed vulnerability details are currently available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1730", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "NVD", "id": "CVE-2021-40014" } ] }, "cve": "CVE-2021-40014", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40014", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401415", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40014", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40014", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40014", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40014", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202201-273", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401415", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401415" }, { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "CNNVD", "id": "CNNVD-202201-273" }, { "db": "NVD", "id": "CVE-2021-40014" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in an out-of-bounds write vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities. No detailed vulnerability details are currently available", "sources": [ { "db": "NVD", "id": "CVE-2021-40014" }, { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "VULHUB", "id": "VHN-401415" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40014", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002888", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-273", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08452", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401415", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401415" }, { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "CNNVD", "id": "CNNVD-202201-273" }, { "db": "NVD", "id": "CVE-2021-40014" } ] }, "id": "VAR-202201-1730", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401415" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:49:56.302000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=177993" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "CNNVD", "id": "CNNVD-202201-273" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401415" }, { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "NVD", "id": "CVE-2021-40014" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.6, "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "trust": 1.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40014" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202307-0000001587168858" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401415" }, { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "CNNVD", "id": "CNNVD-202201-273" }, { "db": "NVD", "id": "CVE-2021-40014" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401415" }, { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "CNNVD", "id": "CNNVD-202201-273" }, { "db": "NVD", "id": "CVE-2021-40014" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401415" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-273" }, { "date": "2022-01-10T14:10:21.463000", "db": "NVD", "id": "CVE-2021-40014" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401415" }, { "date": "2023-01-24T03:18:00", "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "date": "2023-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-273" }, { "date": "2023-07-06T14:15:10.297000", "db": "NVD", "id": "CVE-2021-40014" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-273" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002888" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-273" } ], "trust": 0.6 } }
var-202112-0225
Vulnerability from variot
There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote denial of service and potential remote code execution. Huawei Smartphones contain an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a component of the product that fails to effectively verify integer data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0225", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "NVD", "id": "CVE-2021-37095" } ] }, "cve": "CVE-2021-37095", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37095", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398931", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37095", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37095", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37095", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37095", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2026", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398931", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398931" }, { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "CNNVD", "id": "CNNVD-202109-2026" }, { "db": "NVD", "id": "CVE-2021-37095" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote denial of service and potential remote code execution. Huawei Smartphones contain an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a component of the product that fails to effectively verify integer data", "sources": [ { "db": "NVD", "id": "CVE-2021-37095" }, { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "VULHUB", "id": "VHN-398931" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37095", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015940", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2026", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103536", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398931", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398931" }, { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "CNNVD", "id": "CNNVD-202109-2026" }, { "db": "NVD", "id": "CVE-2021-37095" } ] }, "id": "VAR-202112-0225", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398931" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:58.938000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173503" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "CNNVD", "id": "CNNVD-202109-2026" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398931" }, { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "NVD", "id": "CVE-2021-37095" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37095" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398931" }, { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "CNNVD", "id": "CNNVD-202109-2026" }, { "db": "NVD", "id": "CVE-2021-37095" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398931" }, { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "CNNVD", "id": "CNNVD-202109-2026" }, { "db": "NVD", "id": "CVE-2021-37095" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398931" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2026" }, { "date": "2021-12-07T17:15:09.857000", "db": "NVD", "id": "CVE-2021-37095" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398931" }, { "date": "2022-12-05T01:21:00", "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2026" }, { "date": "2021-12-09T17:34:29.353000", "db": "NVD", "id": "CVE-2021-37095" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2026" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Integer overflow vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015940" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2026" } ], "trust": 0.6 } }
var-202210-0344
Vulnerability from variot
The kernel server has a vulnerability of not verifying the length of the data transferred in the user space.Successful exploitation of this vulnerability may cause out-of-bounds read in the kernel, which affects the device confidentiality and availability. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0344", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "NVD", "id": "CVE-2022-41577" } ] }, "cve": "CVE-2022-41577", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-41577", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41577", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41577", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-41577", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202210-176", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "CNNVD", "id": "CNNVD-202210-176" }, { "db": "NVD", "id": "CVE-2022-41577" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel server has a vulnerability of not verifying the length of the data transferred in the user space.Successful exploitation of this vulnerability may cause out-of-bounds read in the kernel, which affects the device confidentiality and availability. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-41577" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "VULHUB", "id": "VHN-437803" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41577", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018795", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-176", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437803", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437803" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "CNNVD", "id": "CNNVD-202210-176" }, { "db": "NVD", "id": "CVE-2022-41577" } ] }, "id": "VAR-202210-0344", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437803" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:42:12.285000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210794" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437803" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "NVD", "id": "CVE-2022-41577" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41577" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41577/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437803" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "CNNVD", "id": "CNNVD-202210-176" }, { "db": "NVD", "id": "CVE-2022-41577" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437803" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "CNNVD", "id": "CNNVD-202210-176" }, { "db": "NVD", "id": "CVE-2022-41577" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437803" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-176" }, { "date": "2022-10-14T16:15:20.537000", "db": "NVD", "id": "CVE-2022-41577" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437803" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-176" }, { "date": "2022-10-15T01:51:25.887000", "db": "NVD", "id": "CVE-2022-41577" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-176" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018795" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-176" } ], "trust": 0.6 } }
var-202210-0453
Vulnerability from variot
The HwAirlink module has a heap overflow vulnerability in processing data packets of the proprietary protocol.Successful exploitation of this vulnerability may allow attackers to obtain process control permissions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0453", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38980" } ] }, "cve": "CVE-2022-38980", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38980", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38980", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-148", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-148" }, { "db": "NVD", "id": "CVE-2022-38980" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwAirlink module has a heap overflow vulnerability in processing data packets of the proprietary protocol.Successful exploitation of this vulnerability may allow attackers to obtain process control permissions", "sources": [ { "db": "NVD", "id": "CVE-2022-38980" }, { "db": "VULHUB", "id": "VHN-434759" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38980", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-148", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434759", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434759" }, { "db": "CNNVD", "id": "CNNVD-202210-148" }, { "db": "NVD", "id": "CVE-2022-38980" } ] }, "id": "VAR-202210-0453", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434759" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:06.644000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211446" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-148" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434759" }, { "db": "NVD", "id": "CVE-2022-38980" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38980/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434759" }, { "db": "CNNVD", "id": "CNNVD-202210-148" }, { "db": "NVD", "id": "CVE-2022-38980" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434759" }, { "db": "CNNVD", "id": "CNNVD-202210-148" }, { "db": "NVD", "id": "CVE-2022-38980" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434759" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-148" }, { "date": "2022-10-14T16:15:13.467000", "db": "NVD", "id": "CVE-2022-38980" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-20T00:00:00", "db": "VULHUB", "id": "VHN-434759" }, { "date": "2022-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-148" }, { "date": "2022-10-20T12:43:06.200000", "db": "NVD", "id": "CVE-2022-38980" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-148" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-148" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-148" } ], "trust": 0.6 } }
var-202206-0262
Vulnerability from variot
AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an uninitialized pointer access vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0262", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" } ] }, "cve": "CVE-2022-31759", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-31759", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423592", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2022-31759", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31759", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-31759", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-31759", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202206-474", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423592", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "CNNVD", "id": "CNNVD-202206-474" }, { "db": "NVD", "id": "CVE-2022-31759" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an uninitialized pointer access vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31759", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011279", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-474", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66178", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423592", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31759", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "CNNVD", "id": "CNNVD-202206-474" }, { "db": "NVD", "id": "CVE-2022-31759" } ] }, "id": "VAR-202206-0262", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423592" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:17:53.749000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=196701" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-824", "trust": 1.1 }, { "problemtype": "Accessing uninitialized pointers (CWE-824) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31759" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31759/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "CNNVD", "id": "CNNVD-202206-474" }, { "db": "NVD", "id": "CVE-2022-31759" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "CNNVD", "id": "CNNVD-202206-474" }, { "db": "NVD", "id": "CVE-2022-31759" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423592" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31759" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-474" }, { "date": "2022-06-13T15:15:10.337000", "db": "NVD", "id": "CVE-2022-31759" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423592" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31759" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-474" }, { "date": "2022-06-18T03:09:08.127000", "db": "NVD", "id": "CVE-2022-31759" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-474" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product Uninitialized Pointer Access Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011279" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-474" } ], "trust": 0.6 } }
var-202212-0589
Vulnerability from variot
The contacts component has a free (undefined) provider vulnerability. Successful exploitation of this vulnerability may affect data integrity. Huawei of HarmonyOS Exists in a vulnerability related to the use of freed memory.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0589", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "db": "NVD", "id": "CVE-2022-46311" } ] }, "cve": "CVE-2022-46311", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-46311", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46311", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46311", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-46311", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202212-2488", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "db": "CNNVD", "id": "CNNVD-202212-2488" }, { "db": "NVD", "id": "CVE-2022-46311" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The contacts component has a free (undefined) provider vulnerability. Successful exploitation of this vulnerability may affect data integrity. Huawei of HarmonyOS Exists in a vulnerability related to the use of freed memory.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-46311" }, { "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "db": "VULHUB", "id": "VHN-444281" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46311", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023884", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2488", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444281", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444281" }, { "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "db": "CNNVD", "id": "CNNVD-202212-2488" }, { "db": "NVD", "id": "CVE-2022-46311" } ] }, "id": "VAR-202212-0589", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444281" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:23.612000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218946" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2488" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444281" }, { "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "db": "NVD", "id": "CVE-2022-46311" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46311" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46311/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444281" }, { "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "db": "CNNVD", "id": "CNNVD-202212-2488" }, { "db": "NVD", "id": "CVE-2022-46311" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444281" }, { "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "db": "CNNVD", "id": "CNNVD-202212-2488" }, { "db": "NVD", "id": "CVE-2022-46311" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444281" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2488" }, { "date": "2022-12-20T21:15:11.203000", "db": "NVD", "id": "CVE-2022-46311" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444281" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2488" }, { "date": "2022-12-24T04:13:37.667000", "db": "NVD", "id": "CVE-2022-46311" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2488" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023884" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2488" } ], "trust": 0.6 } }
var-202207-0180
Vulnerability from variot
The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0180", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" } ] }, "cve": "CVE-2022-34738", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-34738", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-427080", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-34738", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34738", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-34738", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-34738", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202207-412", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427080", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34738", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "CNNVD", "id": "CNNVD-202207-412" }, { "db": "NVD", "id": "CVE-2022-34738" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34738", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013202", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-412", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52820", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427080", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34738", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "CNNVD", "id": "CNNVD-202207-412" }, { "db": "NVD", "id": "CVE-2022-34738" } ] }, "id": "VAR-202207-0180", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427080" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:42.708000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=199750" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34738" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34738/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "CNNVD", "id": "CNNVD-202207-412" }, { "db": "NVD", "id": "CVE-2022-34738" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "CNNVD", "id": "CNNVD-202207-412" }, { "db": "NVD", "id": "CVE-2022-34738" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427080" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34738" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-412" }, { "date": "2022-07-12T14:15:19.377000", "db": "NVD", "id": "CVE-2022-34738" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427080" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34738" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-412" }, { "date": "2022-07-19T12:42:40.837000", "db": "NVD", "id": "CVE-2022-34738" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-412" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013202" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-412" } ], "trust": 0.6 } }
var-202301-0512
Vulnerability from variot
The DUBAI module has a double free vulnerability. Successful exploitation of this vulnerability may affect system availability. EMUI and HarmonyOS contains a double free vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0512", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "NVD", "id": "CVE-2022-47975" } ] }, "cve": "CVE-2022-47975", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-47975", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-47975", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-47975", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-47975", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202301-436", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "CNNVD", "id": "CNNVD-202301-436" }, { "db": "NVD", "id": "CVE-2022-47975" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DUBAI module has a double free vulnerability. Successful exploitation of this vulnerability may affect system availability. EMUI and HarmonyOS contains a double free vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-47975" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "VULHUB", "id": "VHN-449903" }, { "db": "VULMON", "id": "CVE-2022-47975" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-47975", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001767", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-436", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449903", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-47975", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449903" }, { "db": "VULMON", "id": "CVE-2022-47975" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "CNNVD", "id": "CNNVD-202301-436" }, { "db": "NVD", "id": "CVE-2022-47975" } ] }, "id": "VAR-202301-0512", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449903" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:43:31.742000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0January\u00a02023", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=221313" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449903" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "NVD", "id": "CVE-2022-47975" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-47975" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-47975/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449903" }, { "db": "VULMON", "id": "CVE-2022-47975" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "CNNVD", "id": "CNNVD-202301-436" }, { "db": "NVD", "id": "CVE-2022-47975" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449903" }, { "db": "VULMON", "id": "CVE-2022-47975" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "CNNVD", "id": "CNNVD-202301-436" }, { "db": "NVD", "id": "CVE-2022-47975" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449903" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-47975" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-436" }, { "date": "2023-01-06T20:15:09.880000", "db": "NVD", "id": "CVE-2022-47975" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-449903" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-47975" }, { "date": "2023-05-09T01:35:00", "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "date": "2023-02-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-436" }, { "date": "2023-02-09T17:15:11.837000", "db": "NVD", "id": "CVE-2022-47975" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-436" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Double release vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001767" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-436" } ], "trust": 0.6 } }
var-202208-0606
Vulnerability from variot
The diag-router module has a vulnerability in intercepting excessive long and short instructions. Successful exploitation of this vulnerability will cause the diag-router module to crash. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0606", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "db": "NVD", "id": "CVE-2022-37001" } ] }, "cve": "CVE-2022-37001", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-37001", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37001", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-37001", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-37001", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202208-2401", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "db": "CNNVD", "id": "CNNVD-202208-2401" }, { "db": "NVD", "id": "CVE-2022-37001" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The diag-router module has a vulnerability in intercepting excessive long and short instructions. Successful exploitation of this vulnerability will cause the diag-router module to crash. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37001" }, { "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "db": "VULHUB", "id": "VHN-427492" }, { "db": "VULMON", "id": "CVE-2022-37001" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37001", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014555", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2401", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427492", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37001", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427492" }, { "db": "VULMON", "id": "CVE-2022-37001" }, { "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "db": "CNNVD", "id": "CNNVD-202208-2401" }, { "db": "NVD", "id": "CVE-2022-37001" } ] }, "id": "VAR-202208-0606", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427492" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:02.240000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=204371" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2401" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "db": "NVD", "id": "CVE-2022-37001" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37001" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37001/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427492" }, { "db": "VULMON", "id": "CVE-2022-37001" }, { "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "db": "CNNVD", "id": "CNNVD-202208-2401" }, { "db": "NVD", "id": "CVE-2022-37001" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427492" }, { "db": "VULMON", "id": "CVE-2022-37001" }, { "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "db": "CNNVD", "id": "CNNVD-202208-2401" }, { "db": "NVD", "id": "CVE-2022-37001" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427492" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37001" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2401" }, { "date": "2022-08-10T20:16:03.557000", "db": "NVD", "id": "CVE-2022-37001" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427492" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37001" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2401" }, { "date": "2022-08-15T18:03:58.447000", "db": "NVD", "id": "CVE-2022-37001" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2401" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014555" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2401" } ], "trust": 0.6 } }
var-202209-0431
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0431", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "NVD", "id": "CVE-2022-38995" } ] }, "cve": "CVE-2022-38995", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-38995", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38995", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38995", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-38995", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-175", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "CNNVD", "id": "CNNVD-202209-175" }, { "db": "NVD", "id": "CVE-2022-38995" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-38995" }, { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "VULHUB", "id": "VHN-434767" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38995", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016784", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-175", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434767", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434767" }, { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "CNNVD", "id": "CNNVD-202209-175" }, { "db": "NVD", "id": "CVE-2022-38995" } ] }, "id": "VAR-202209-0431", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434767" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:26.904000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208082" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "NVD", "id": "CVE-2022-38995" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38995" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38995/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434767" }, { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "CNNVD", "id": "CNNVD-202209-175" }, { "db": "NVD", "id": "CVE-2022-38995" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434767" }, { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "CNNVD", "id": "CNNVD-202209-175" }, { "db": "NVD", "id": "CVE-2022-38995" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434767" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-175" }, { "date": "2022-09-16T18:15:17.743000", "db": "NVD", "id": "CVE-2022-38995" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-434767" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "date": "2022-09-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-175" }, { "date": "2022-09-17T03:12:10.783000", "db": "NVD", "id": "CVE-2022-38995" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-175" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016784" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-175" } ], "trust": 0.6 } }
var-202210-0250
Vulnerability from variot
The security module has configuration defects.Successful exploitation of this vulnerability may affect system availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0250", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41582" } ] }, "cve": "CVE-2022-41582", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-41582", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41582", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-173", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-173" }, { "db": "NVD", "id": "CVE-2022-41582" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The security module has configuration defects.Successful exploitation of this vulnerability may affect system availability", "sources": [ { "db": "NVD", "id": "CVE-2022-41582" }, { "db": "VULHUB", "id": "VHN-437812" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41582", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-173", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437812", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437812" }, { "db": "CNNVD", "id": "CNNVD-202210-173" }, { "db": "NVD", "id": "CVE-2022-41582" } ] }, "id": "VAR-202210-0250", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437812" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:37:17.061000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211155" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41582" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41582/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437812" }, { "db": "CNNVD", "id": "CNNVD-202210-173" }, { "db": "NVD", "id": "CVE-2022-41582" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437812" }, { "db": "CNNVD", "id": "CNNVD-202210-173" }, { "db": "NVD", "id": "CVE-2022-41582" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437812" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-173" }, { "date": "2022-10-14T16:15:22.447000", "db": "NVD", "id": "CVE-2022-41582" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437812" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-173" }, { "date": "2022-10-18T17:32:15.043000", "db": "NVD", "id": "CVE-2022-41582" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-173" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-173" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-173" } ], "trust": 0.6 } }
var-202110-1850
Vulnerability from variot
Chang Lian application has a vulnerability which can be maliciously exploited to hide the calling number.Successful exploitation of this vulnerability allows you to make an anonymous call. HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1850", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "NVD", "id": "CVE-2021-39981" } ] }, "cve": "CVE-2021-39981", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2021-39981", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-401382", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-39981", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39981", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39981", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-39981", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2231", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401382", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401382" }, { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "CNNVD", "id": "CNNVD-202110-2231" }, { "db": "NVD", "id": "CVE-2021-39981" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Chang Lian application has a vulnerability which can be maliciously exploited to hide the calling number.Successful exploitation of this vulnerability allows you to make an anonymous call. HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-39981" }, { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "VULHUB", "id": "VHN-401382" }, { "db": "VULMON", "id": "CVE-2021-39981" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39981", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017585", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2231", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08456", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401382", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39981", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401382" }, { "db": "VULMON", "id": "CVE-2021-39981" }, { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "CNNVD", "id": "CNNVD-202110-2231" }, { "db": "NVD", "id": "CVE-2021-39981" } ] }, "id": "VAR-202110-1850", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401382" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:33:02.018000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176779" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "CNNVD", "id": "CNNVD-202110-2231" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "NVD", "id": "CVE-2021-39981" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39981" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401382" }, { "db": "VULMON", "id": "CVE-2021-39981" }, { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "CNNVD", "id": "CNNVD-202110-2231" }, { "db": "NVD", "id": "CVE-2021-39981" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401382" }, { "db": "VULMON", "id": "CVE-2021-39981" }, { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "CNNVD", "id": "CNNVD-202110-2231" }, { "db": "NVD", "id": "CVE-2021-39981" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401382" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39981" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2231" }, { "date": "2022-01-03T22:15:10.627000", "db": "NVD", "id": "CVE-2021-39981" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401382" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39981" }, { "date": "2023-01-27T03:16:00", "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2231" }, { "date": "2022-01-13T19:21:58.607000", "db": "NVD", "id": "CVE-2021-39981" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2231" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017585" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2231" } ], "trust": 0.6 } }
var-202110-1860
Vulnerability from variot
Telephony application has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could lead to sensitive information disclosure. HarmonyOS There is a vulnerability related to information leakage.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. An attacker could exploit this vulnerability to obtain the IMSI by bypassing the necessary permissions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1860", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "NVD", "id": "CVE-2021-39980" } ] }, "cve": "CVE-2021-39980", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-39980", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401381", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2021-39980", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-39980", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39980", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-39980", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2221", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401381", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401381" }, { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "CNNVD", "id": "CNNVD-202110-2221" }, { "db": "NVD", "id": "CVE-2021-39980" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Telephony application has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could lead to sensitive information disclosure. HarmonyOS There is a vulnerability related to information leakage.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. An attacker could exploit this vulnerability to obtain the IMSI by bypassing the necessary permissions", "sources": [ { "db": "NVD", "id": "CVE-2021-39980" }, { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "VULHUB", "id": "VHN-401381" }, { "db": "VULMON", "id": "CVE-2021-39980" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39980", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017586", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2221", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08457", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401381", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39980", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401381" }, { "db": "VULMON", "id": "CVE-2021-39980" }, { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "CNNVD", "id": "CNNVD-202110-2221" }, { "db": "NVD", "id": "CVE-2021-39980" } ] }, "id": "VAR-202110-1860", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401381" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:03:01.427000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176769" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "CNNVD", "id": "CNNVD-202110-2221" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 }, { "problemtype": "information leak (CWE-200) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401381" }, { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "NVD", "id": "CVE-2021-39980" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39980" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401381" }, { "db": "VULMON", "id": "CVE-2021-39980" }, { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "CNNVD", "id": "CNNVD-202110-2221" }, { "db": "NVD", "id": "CVE-2021-39980" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401381" }, { "db": "VULMON", "id": "CVE-2021-39980" }, { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "CNNVD", "id": "CNNVD-202110-2221" }, { "db": "NVD", "id": "CVE-2021-39980" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401381" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39980" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2221" }, { "date": "2022-01-03T22:15:10.570000", "db": "NVD", "id": "CVE-2021-39980" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401381" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39980" }, { "date": "2023-01-27T03:19:00", "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2221" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-39980" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2221" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability regarding information leakage in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017586" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2221" } ], "trust": 0.6 } }
var-202212-0588
Vulnerability from variot
The application management module has a vulnerability in permission verification. Successful exploitation of this vulnerability causes unexpected clear of device applications. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0588", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "NVD", "id": "CVE-2022-46312" } ] }, "cve": "CVE-2022-46312", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-46312", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46312", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46312", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-46312", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202212-2495", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "CNNVD", "id": "CNNVD-202212-2495" }, { "db": "NVD", "id": "CVE-2022-46312" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The application management module has a vulnerability in permission verification. Successful exploitation of this vulnerability causes unexpected clear of device applications. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-46312" }, { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "VULHUB", "id": "VHN-444282" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46312", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023885", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2495", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444282", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444282" }, { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "CNNVD", "id": "CNNVD-202212-2495" }, { "db": "NVD", "id": "CVE-2022-46312" } ] }, "id": "VAR-202212-0588", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444282" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:43:37.685000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218951" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "NVD", "id": "CVE-2022-46312" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46312" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46312/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444282" }, { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "CNNVD", "id": "CNNVD-202212-2495" }, { "db": "NVD", "id": "CVE-2022-46312" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444282" }, { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "CNNVD", "id": "CNNVD-202212-2495" }, { "db": "NVD", "id": "CVE-2022-46312" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444282" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2495" }, { "date": "2022-12-20T21:15:11.257000", "db": "NVD", "id": "CVE-2022-46312" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444282" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2495" }, { "date": "2022-12-24T04:13:56.900000", "db": "NVD", "id": "CVE-2022-46312" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2495" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023885" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2495" } ], "trust": 0.6 } }
var-202203-0973
Vulnerability from variot
There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0973", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" } ] }, "cve": "CVE-2021-40055", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2021-40055", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-401456", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:C/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "id": "CVE-2021-40055", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40055", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40055", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-40055", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202203-979", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401456", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "CNNVD", "id": "CNNVD-202203-979" }, { "db": "NVD", "id": "CVE-2021-40055" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "VULHUB", "id": "VHN-401456" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40055", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018709", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-979", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401456", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "CNNVD", "id": "CNNVD-202203-979" }, { "db": "NVD", "id": "CVE-2021-40055" } ] }, "id": "VAR-202203-0973", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401456" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:42:57.086000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=185893" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40055" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40055/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "CNNVD", "id": "CNNVD-202203-979" }, { "db": "NVD", "id": "CVE-2021-40055" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "CNNVD", "id": "CNNVD-202203-979" }, { "db": "NVD", "id": "CVE-2021-40055" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401456" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-979" }, { "date": "2022-03-10T17:43:20.810000", "db": "NVD", "id": "CVE-2021-40055" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401456" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-979" }, { "date": "2022-03-14T15:53:08.183000", "db": "NVD", "id": "CVE-2021-40055" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-979" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018709" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-979" } ], "trust": 0.6 } }
var-202205-0169
Vulnerability from variot
The HiAIserver has a vulnerability in verifying the validity of the properties used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the failure of hiaiserver to strictly verify the validity of the attributes in the model
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0169", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "NVD", "id": "CVE-2022-29789" } ] }, "cve": "CVE-2022-29789", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-29789", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421298", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-29789", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29789", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29789", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-29789", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202205-2547", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421298", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421298" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "CNNVD", "id": "CNNVD-202205-2547" }, { "db": "NVD", "id": "CVE-2022-29789" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiAIserver has a vulnerability in verifying the validity of the properties used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the failure of hiaiserver to strictly verify the validity of the attributes in the model", "sources": [ { "db": "NVD", "id": "CVE-2022-29789" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "VULHUB", "id": "VHN-421298" }, { "db": "VULMON", "id": "CVE-2022-29789" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29789", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009632", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2547", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-53576", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421298", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29789", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421298" }, { "db": "VULMON", "id": "CVE-2022-29789" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "CNNVD", "id": "CNNVD-202205-2547" }, { "db": "NVD", "id": "CVE-2022-29789" } ] }, "id": "VAR-202205-0169", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421298" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:49.658000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193768" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "NVD", "id": "CVE-2022-29789" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29789" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29789/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421298" }, { "db": "VULMON", "id": "CVE-2022-29789" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "CNNVD", "id": "CNNVD-202205-2547" }, { "db": "NVD", "id": "CVE-2022-29789" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421298" }, { "db": "VULMON", "id": "CVE-2022-29789" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "CNNVD", "id": "CNNVD-202205-2547" }, { "db": "NVD", "id": "CVE-2022-29789" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421298" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29789" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2547" }, { "date": "2022-05-13T15:15:09.743000", "db": "NVD", "id": "CVE-2022-29789" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421298" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29789" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2547" }, { "date": "2022-05-23T18:43:11.697000", "db": "NVD", "id": "CVE-2022-29789" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2547" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009632" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2547" } ], "trust": 0.6 } }
var-202207-0134
Vulnerability from variot
The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0. The vulnerability is due to the improper neutralization of the special elements used in the command. abnormal function
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0134", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" } ] }, "cve": "CVE-2022-34740", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CVE-2022-34740", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.9, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-427089", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2022-34740", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34740", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-34740", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-34740", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202207-397", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-427089", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-34740", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "CNNVD", "id": "CNNVD-202207-397" }, { "db": "NVD", "id": "CVE-2022-34740" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0. The vulnerability is due to the improper neutralization of the special elements used in the command. abnormal function", "sources": [ { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34740", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013200", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-397", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-57612", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427089", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34740", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "CNNVD", "id": "CNNVD-202207-397" }, { "db": "NVD", "id": "CVE-2022-34740" } ] }, "id": "VAR-202207-0134", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427089" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:17:51.324000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=199746" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34740" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34740/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "CNNVD", "id": "CNNVD-202207-397" }, { "db": "NVD", "id": "CVE-2022-34740" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "CNNVD", "id": "CNNVD-202207-397" }, { "db": "NVD", "id": "CVE-2022-34740" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427089" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34740" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-397" }, { "date": "2022-07-12T14:15:19.453000", "db": "NVD", "id": "CVE-2022-34740" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427089" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34740" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-397" }, { "date": "2022-07-19T14:08:05.747000", "db": "NVD", "id": "CVE-2022-34740" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-397" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013200" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-397" } ], "trust": 0.6 } }
var-202211-0371
Vulnerability from variot
There is a race condition vulnerability in SD upgrade mode. Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0371", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "NVD", "id": "CVE-2022-44563" } ] }, "cve": "CVE-2022-44563", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2022-44563", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-44563", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44563", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-44563", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202211-2126", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "CNNVD", "id": "CNNVD-202211-2126" }, { "db": "NVD", "id": "CVE-2022-44563" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a race condition vulnerability in SD upgrade mode. Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-44563" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "VULHUB", "id": "VHN-441954" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44563", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020500", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2126", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441954", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441954" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "CNNVD", "id": "CNNVD-202211-2126" }, { "db": "NVD", "id": "CVE-2022-44563" } ] }, "id": "VAR-202211-0371", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441954" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:42:10.821000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213970" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441954" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "NVD", "id": "CVE-2022-44563" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44563" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44563/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441954" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "CNNVD", "id": "CNNVD-202211-2126" }, { "db": "NVD", "id": "CVE-2022-44563" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441954" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "CNNVD", "id": "CNNVD-202211-2126" }, { "db": "NVD", "id": "CVE-2022-44563" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441954" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2126" }, { "date": "2022-11-09T21:15:18.977000", "db": "NVD", "id": "CVE-2022-44563" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441954" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2126" }, { "date": "2022-11-10T13:56:16.547000", "db": "NVD", "id": "CVE-2022-44563" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2126" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Race condition vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020500" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2126" } ], "trust": 0.6 } }
var-202211-0370
Vulnerability from variot
The LBS module has a vulnerability in geofencing API access. Successful exploitation of this vulnerability may cause third-party apps to access the geofencing APIs without authorization, affecting user confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0370", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "NVD", "id": "CVE-2022-44549" } ] }, "cve": "CVE-2022-44549", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-44549", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-44549", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44549", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-44549", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202211-2130", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "CNNVD", "id": "CNNVD-202211-2130" }, { "db": "NVD", "id": "CVE-2022-44549" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The LBS module has a vulnerability in geofencing API access. Successful exploitation of this vulnerability may cause third-party apps to access the geofencing APIs without authorization, affecting user confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-44549" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "VULHUB", "id": "VHN-441930" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44549", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020504", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2130", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441930", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441930" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "CNNVD", "id": "CNNVD-202211-2130" }, { "db": "NVD", "id": "CVE-2022-44549" } ] }, "id": "VAR-202211-0370", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441930" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:22.731000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213971" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441930" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "NVD", "id": "CVE-2022-44549" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44549" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44549/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441930" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "CNNVD", "id": "CNNVD-202211-2130" }, { "db": "NVD", "id": "CVE-2022-44549" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441930" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "CNNVD", "id": "CNNVD-202211-2130" }, { "db": "NVD", "id": "CVE-2022-44549" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441930" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2130" }, { "date": "2022-11-09T21:15:18.160000", "db": "NVD", "id": "CVE-2022-44549" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441930" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2130" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-44549" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2130" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020504" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2130" } ], "trust": 0.6 } }
var-202108-0289
Vulnerability from variot
A component of the HarmonyOS has a Out-of-bounds Write Vulnerability. Local attackers may exploit this vulnerability to cause integer overflow
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0289", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22423" } ] }, "cve": "CVE-2021-22423", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2021-22423", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380858", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22423", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22423", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-321", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380858", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22423", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380858" }, { "db": "VULMON", "id": "CVE-2021-22423" }, { "db": "CNNVD", "id": "CNNVD-202108-321" }, { "db": "NVD", "id": "CVE-2021-22423" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Out-of-bounds Write Vulnerability. Local attackers may exploit this vulnerability to cause integer overflow", "sources": [ { "db": "NVD", "id": "CVE-2021-22423" }, { "db": "VULHUB", "id": "VHN-380858" }, { "db": "VULMON", "id": "CVE-2021-22423" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22423", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-321", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380858", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22423", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380858" }, { "db": "VULMON", "id": "CVE-2021-22423" }, { "db": "CNNVD", "id": "CNNVD-202108-321" }, { "db": "NVD", "id": "CVE-2021-22423" } ] }, "id": "VAR-202108-0289", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380858" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:27:39.411000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=159485" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-321" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380858" }, { "db": "NVD", "id": "CVE-2021-22423" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22423" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380858" }, { "db": "VULMON", "id": "CVE-2021-22423" }, { "db": "CNNVD", "id": "CNNVD-202108-321" }, { "db": "NVD", "id": "CVE-2021-22423" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380858" }, { "db": "VULMON", "id": "CVE-2021-22423" }, { "db": "CNNVD", "id": "CNNVD-202108-321" }, { "db": "NVD", "id": "CVE-2021-22423" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380858" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22423" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-321" }, { "date": "2021-08-03T18:15:08.230000", "db": "NVD", "id": "CVE-2021-22423" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-10T00:00:00", "db": "VULHUB", "id": "VHN-380858" }, { "date": "2021-08-10T00:00:00", "db": "VULMON", "id": "CVE-2021-22423" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-321" }, { "date": "2021-08-10T21:24:09.697000", "db": "NVD", "id": "CVE-2021-22423" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-321" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-321" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-321" } ], "trust": 0.6 } }
var-202302-0456
Vulnerability from variot
The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0456", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "NVD", "id": "CVE-2022-48289" } ] }, "cve": "CVE-2022-48289", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-48289", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48289", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48289", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-48289", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202302-346", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "CNNVD", "id": "CNNVD-202302-346" }, { "db": "NVD", "id": "CVE-2022-48289" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "VULHUB", "id": "VHN-453369" }, { "db": "VULMON", "id": "CVE-2022-48289" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48289", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003376", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-346", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453369", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48289", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453369" }, { "db": "VULMON", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "CNNVD", "id": "CNNVD-202302-346" }, { "db": "NVD", "id": "CVE-2022-48289" } ] }, "id": "VAR-202302-0456", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453369" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:19.618000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225747" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2022-48289 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453369" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "NVD", "id": "CVE-2022-48289" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48289" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48289/" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48289" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453369" }, { "db": "VULMON", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "CNNVD", "id": "CNNVD-202302-346" }, { "db": "NVD", "id": "CVE-2022-48289" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453369" }, { "db": "VULMON", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "CNNVD", "id": "CNNVD-202302-346" }, { "db": "NVD", "id": "CVE-2022-48289" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453369" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48289" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-346" }, { "date": "2023-02-09T17:15:12.850000", "db": "NVD", "id": "CVE-2022-48289" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453369" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48289" }, { "date": "2023-09-07T01:48:00", "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-346" }, { "date": "2023-02-16T14:16:21.480000", "db": "NVD", "id": "CVE-2022-48289" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-346" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003376" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-346" } ], "trust": 0.6 } }
var-202208-0445
Vulnerability from variot
The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by a flaw introduced in the design process
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0445", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" } ] }, "cve": "CVE-2021-40030", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40030", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40030", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40030", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40030", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202208-2395", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" }, { "db": "NVD", "id": "CVE-2021-40030" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by a flaw introduced in the design process", "sources": [ { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "VULHUB", "id": "VHN-401431" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40030", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-020148", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2395", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401431", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401431" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" }, { "db": "NVD", "id": "CVE-2021-40030" } ] }, "id": "VAR-202208-0445", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401431" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:17:49.228000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=204203" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40030" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40030/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401431" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" }, { "db": "NVD", "id": "CVE-2021-40030" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401431" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" }, { "db": "NVD", "id": "CVE-2021-40030" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-401431" }, { "date": "2023-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2395" }, { "date": "2022-08-10T20:15:22.347000", "db": "NVD", "id": "CVE-2021-40030" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "VULHUB", "id": "VHN-401431" }, { "date": "2023-09-19T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "date": "2022-08-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2395" }, { "date": "2022-08-12T21:20:01.687000", "db": "NVD", "id": "CVE-2021-40030" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2395" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2395" } ], "trust": 0.6 } }
var-202108-0288
Vulnerability from variot
A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0288", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "NVD", "id": "CVE-2021-22422" } ] }, "cve": "CVE-2021-22422", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2021-22422", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380857", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22422", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22422", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22422", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22422", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202108-320", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380857", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22422", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380857" }, { "db": "VULMON", "id": "CVE-2021-22422" }, { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "CNNVD", "id": "CNNVD-202108-320" }, { "db": "NVD", "id": "CVE-2021-22422" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22422" }, { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "VULHUB", "id": "VHN-380857" }, { "db": "VULMON", "id": "CVE-2021-22422" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22422", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009365", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-320", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380857", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22422", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380857" }, { "db": "VULMON", "id": "CVE-2021-22422" }, { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "CNNVD", "id": "CNNVD-202108-320" }, { "db": "NVD", "id": "CVE-2021-22422" } ] }, "id": "VAR-202108-0288", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380857" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:18:24.477000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=159650" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "CNNVD", "id": "CNNVD-202108-320" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380857" }, { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "NVD", "id": "CVE-2021-22422" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22422" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/190.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380857" }, { "db": "VULMON", "id": "CVE-2021-22422" }, { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "CNNVD", "id": "CNNVD-202108-320" }, { "db": "NVD", "id": "CVE-2021-22422" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380857" }, { "db": "VULMON", "id": "CVE-2021-22422" }, { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "CNNVD", "id": "CNNVD-202108-320" }, { "db": "NVD", "id": "CVE-2021-22422" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380857" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22422" }, { "date": "2022-04-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-320" }, { "date": "2021-08-03T18:15:08.193000", "db": "NVD", "id": "CVE-2021-22422" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-380857" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22422" }, { "date": "2022-04-21T08:43:00", "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-320" }, { "date": "2021-08-11T13:32:37.243000", "db": "NVD", "id": "CVE-2021-22422" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-320" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009365" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-320" } ], "trust": 0.6 } }
var-202206-0259
Vulnerability from variot
The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0259", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" } ] }, "cve": "CVE-2021-46814", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-46814", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423547", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-46814", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46814", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46814", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-46814", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202206-481", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423547", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46814", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "CNNVD", "id": "CNNVD-202206-481" }, { "db": "NVD", "id": "CVE-2021-46814" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46814", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011372", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-481", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-51604", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423547", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46814", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "CNNVD", "id": "CNNVD-202206-481" }, { "db": "NVD", "id": "CVE-2021-46814" } ] }, "id": "VAR-202206-0259", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423547" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:40.991000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46814" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46814/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "CNNVD", "id": "CNNVD-202206-481" }, { "db": "NVD", "id": "CVE-2021-46814" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "CNNVD", "id": "CNNVD-202206-481" }, { "db": "NVD", "id": "CVE-2021-46814" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423547" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46814" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-481" }, { "date": "2022-06-13T15:15:09.893000", "db": "NVD", "id": "CVE-2021-46814" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423547" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2021-46814" }, { "date": "2023-08-21T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-481" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-46814" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-481" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011372" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-481" } ], "trust": 0.6 } }
var-202112-0228
Vulnerability from variot
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash. Huawei Smartphone products contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0228", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "NVD", "id": "CVE-2021-37090" } ] }, "cve": "CVE-2021-37090", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37090", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398926", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37090", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37090", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37090", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37090", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2003", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398926", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398926" }, { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "CNNVD", "id": "CNNVD-202109-2003" }, { "db": "NVD", "id": "CVE-2021-37090" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash. Huawei Smartphone products contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37090" }, { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "VULHUB", "id": "VHN-398926" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37090", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016024", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2003", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103539", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398926", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398926" }, { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "CNNVD", "id": "CNNVD-202109-2003" }, { "db": "NVD", "id": "CVE-2021-37090" } ] }, "id": "VAR-202112-0228", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398926" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:44.761000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173783" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "CNNVD", "id": "CNNVD-202109-2003" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398926" }, { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "NVD", "id": "CVE-2021-37090" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37090" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398926" }, { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "CNNVD", "id": "CNNVD-202109-2003" }, { "db": "NVD", "id": "CVE-2021-37090" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398926" }, { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "CNNVD", "id": "CNNVD-202109-2003" }, { "db": "NVD", "id": "CVE-2021-37090" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398926" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2003" }, { "date": "2021-12-07T17:15:09.740000", "db": "NVD", "id": "CVE-2021-37090" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398926" }, { "date": "2022-12-05T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "date": "2021-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2003" }, { "date": "2021-12-09T18:16:43.410000", "db": "NVD", "id": "CVE-2021-37090" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2003" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-bounds reading vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016024" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2003" } ], "trust": 0.6 } }
var-202210-0123
Vulnerability from variot
The HISP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0123", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38998" } ] }, "cve": "CVE-2022-38998", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38998", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38998", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-184", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-184" }, { "db": "NVD", "id": "CVE-2022-38998" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HISP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-38998" }, { "db": "VULHUB", "id": "VHN-434769" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38998", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-184", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434769", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434769" }, { "db": "CNNVD", "id": "CNNVD-202210-184" }, { "db": "NVD", "id": "CVE-2022-38998" } ] }, "id": "VAR-202210-0123", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434769" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:30.102000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211160" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434769" }, { "db": "NVD", "id": "CVE-2022-38998" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38998/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434769" }, { "db": "CNNVD", "id": "CNNVD-202210-184" }, { "db": "NVD", "id": "CVE-2022-38998" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434769" }, { "db": "CNNVD", "id": "CNNVD-202210-184" }, { "db": "NVD", "id": "CVE-2022-38998" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434769" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-184" }, { "date": "2022-10-14T16:15:16.623000", "db": "NVD", "id": "CVE-2022-38998" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434769" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-184" }, { "date": "2022-10-18T15:48:51.240000", "db": "NVD", "id": "CVE-2022-38998" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-184" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-184" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-184" } ], "trust": 0.6 } }
var-202110-1861
Vulnerability from variot
Phone Manager application has a Improper Privilege Management vulnerability.Successful exploitation of this vulnerability may read and write arbitrary files by tampering with Phone Manager notifications. HarmonyOS Exists in a permission management vulnerability.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. Attackers can exploit this vulnerability to cause abnormal system functions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1861", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "NVD", "id": "CVE-2021-39982" } ] }, "cve": "CVE-2021-39982", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-39982", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401383", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-39982", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39982", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39982", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-39982", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202110-2220", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401383", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401383" }, { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "CNNVD", "id": "CNNVD-202110-2220" }, { "db": "NVD", "id": "CVE-2021-39982" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Phone Manager application has a Improper Privilege Management vulnerability.Successful exploitation of this vulnerability may read and write arbitrary files by tampering with Phone Manager notifications. HarmonyOS Exists in a permission management vulnerability.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. Attackers can exploit this vulnerability to cause abnormal system functions", "sources": [ { "db": "NVD", "id": "CVE-2021-39982" }, { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "VULHUB", "id": "VHN-401383" }, { "db": "VULMON", "id": "CVE-2021-39982" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39982", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017584", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2220", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08345", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401383", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39982", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401383" }, { "db": "VULMON", "id": "CVE-2021-39982" }, { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "CNNVD", "id": "CNNVD-202110-2220" }, { "db": "NVD", "id": "CVE-2021-39982" } ] }, "id": "VAR-202110-1861", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401383" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:46.112000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176768" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "CNNVD", "id": "CNNVD-202110-2220" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401383" }, { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "NVD", "id": "CVE-2021-39982" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39982" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401383" }, { "db": "VULMON", "id": "CVE-2021-39982" }, { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "CNNVD", "id": "CNNVD-202110-2220" }, { "db": "NVD", "id": "CVE-2021-39982" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401383" }, { "db": "VULMON", "id": "CVE-2021-39982" }, { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "CNNVD", "id": "CNNVD-202110-2220" }, { "db": "NVD", "id": "CVE-2021-39982" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401383" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39982" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2220" }, { "date": "2022-01-03T22:15:10.687000", "db": "NVD", "id": "CVE-2021-39982" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401383" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39982" }, { "date": "2023-01-27T03:12:00", "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2220" }, { "date": "2022-01-13T19:28:23.277000", "db": "NVD", "id": "CVE-2021-39982" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2220" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in privilege management in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017584" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2220" } ], "trust": 0.6 } }
var-202302-0369
Vulnerability from variot
The AMS module has a vulnerability of lacking permission verification in APIs.Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0369", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "NVD", "id": "CVE-2022-48302" } ] }, "cve": "CVE-2022-48302", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-48302", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48302", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48302", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-48302", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202302-338", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "CNNVD", "id": "CNNVD-202302-338" }, { "db": "NVD", "id": "CVE-2022-48302" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability of lacking permission verification in APIs.Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48302" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "VULHUB", "id": "VHN-453382" }, { "db": "VULMON", "id": "CVE-2022-48302" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48302", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003401", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-338", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453382", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48302", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453382" }, { "db": "VULMON", "id": "CVE-2022-48302" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "CNNVD", "id": "CNNVD-202302-338" }, { "db": "NVD", "id": "CVE-2022-48302" } ] }, "id": "VAR-202302-0369", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453382" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:09.582000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225741" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453382" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "NVD", "id": "CVE-2022-48302" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48302" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48302/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453382" }, { "db": "VULMON", "id": "CVE-2022-48302" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "CNNVD", "id": "CNNVD-202302-338" }, { "db": "NVD", "id": "CVE-2022-48302" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453382" }, { "db": "VULMON", "id": "CVE-2022-48302" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "CNNVD", "id": "CNNVD-202302-338" }, { "db": "NVD", "id": "CVE-2022-48302" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453382" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48302" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-338" }, { "date": "2023-02-09T17:15:15.540000", "db": "NVD", "id": "CVE-2022-48302" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453382" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48302" }, { "date": "2023-09-07T03:06:00", "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-338" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-48302" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-338" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003401" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-338" } ], "trust": 0.6 } }
var-202112-0353
Vulnerability from variot
There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. plural Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0353", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" } ] }, "cve": "CVE-2021-37044", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37044", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398877", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37044", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37044", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37044", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37044", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2048", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398877", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" }, { "db": "NVD", "id": "CVE-2021-37044" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. plural Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "VULHUB", "id": "VHN-398877" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37044", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015892", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2048", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398877", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" }, { "db": "NVD", "id": "CVE-2021-37044" } ] }, "id": "VAR-202112-0353", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398877" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:58.777000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Permission\u00a0control\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for permissions and access control issues vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173801" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37044" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" }, { "db": "NVD", "id": "CVE-2021-37044" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" }, { "db": "NVD", "id": "CVE-2021-37044" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398877" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2048" }, { "date": "2021-12-08T15:15:09.323000", "db": "NVD", "id": "CVE-2021-37044" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398877" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2048" }, { "date": "2021-12-09T17:56:42.897000", "db": "NVD", "id": "CVE-2021-37044" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2048" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to improper retention of permissions in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015892" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2048" } ], "trust": 0.6 } }
var-202110-1856
Vulnerability from variot
There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion. Huawei Smartphone products are vulnerable to resource allocation without limits or throttling.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1856", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" } ] }, "cve": "CVE-2021-37111", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37111", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398947", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37111", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37111", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37111", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37111", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2225", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398947", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" }, { "db": "NVD", "id": "CVE-2021-37111" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion. Huawei Smartphone products are vulnerable to resource allocation without limits or throttling.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37111", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017379", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2225", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398947", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37111", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" }, { "db": "NVD", "id": "CVE-2021-37111" } ] }, "id": "VAR-202110-1856", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398947" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:27:35.248000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176773" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-770", "trust": 1.1 }, { "problemtype": "Allocation of resources without limits or throttling (CWE-770) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37111" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" }, { "db": "NVD", "id": "CVE-2021-37111" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" }, { "db": "NVD", "id": "CVE-2021-37111" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398947" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37111" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2225" }, { "date": "2022-01-03T22:15:09.057000", "db": "NVD", "id": "CVE-2021-37111" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398947" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37111" }, { "date": "2023-01-17T07:04:00", "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2225" }, { "date": "2022-01-11T19:31:32.390000", "db": "NVD", "id": "CVE-2021-37111" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2225" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in resource allocation without limits or throttling in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017379" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2225" } ], "trust": 0.6 } }
var-202209-0199
Vulnerability from variot
The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps. Huawei of EMUI and HarmonyOS There is a vulnerability in deserialization of untrusted data.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS versions prior to 2.0 have a security vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0199", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "NVD", "id": "CVE-2022-39008" } ] }, "cve": "CVE-2022-39008", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-39008", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39008", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-39008", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-39008", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202209-219", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "CNNVD", "id": "CNNVD-202209-219" }, { "db": "NVD", "id": "CVE-2022-39008" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps. Huawei of EMUI and HarmonyOS There is a vulnerability in deserialization of untrusted data.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS versions prior to 2.0 have a security vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2022-39008" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "VULHUB", "id": "VHN-428483" }, { "db": "VULMON", "id": "CVE-2022-39008" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39008", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017586", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-219", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-64980", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428483", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39008", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428483" }, { "db": "VULMON", "id": "CVE-2022-39008" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "CNNVD", "id": "CNNVD-202209-219" }, { "db": "NVD", "id": "CVE-2022-39008" } ] }, "id": "VAR-202209-0199", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428483" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:02:23.331000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=208618" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.1 }, { "problemtype": "Deserialization of untrusted data (CWE-502) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428483" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "NVD", "id": "CVE-2022-39008" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39008" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39008/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428483" }, { "db": "VULMON", "id": "CVE-2022-39008" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "CNNVD", "id": "CNNVD-202209-219" }, { "db": "NVD", "id": "CVE-2022-39008" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428483" }, { "db": "VULMON", "id": "CVE-2022-39008" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "CNNVD", "id": "CNNVD-202209-219" }, { "db": "NVD", "id": "CVE-2022-39008" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428483" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39008" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-219" }, { "date": "2022-09-16T18:15:18.210000", "db": "NVD", "id": "CVE-2022-39008" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428483" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39008" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-219" }, { "date": "2022-09-21T13:55:35.557000", "db": "NVD", "id": "CVE-2022-39008" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-219" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Untrusted Data Deserialization Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017586" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-219" } ], "trust": 0.6 } }
var-202112-0351
Vulnerability from variot
There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0351", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" } ] }, "cve": "CVE-2021-37049", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37049", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398882", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37049", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37049", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37049", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37049", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2021", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398882", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" }, { "db": "NVD", "id": "CVE-2021-37049" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "VULHUB", "id": "VHN-398882" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37049", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015857", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2021", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398882", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" }, { "db": "NVD", "id": "CVE-2021-37049" } ] }, "id": "VAR-202112-0351", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398882" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:58.802000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Heap-based\u00a0buffer\u00a0overflow\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173789" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37049" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" }, { "db": "NVD", "id": "CVE-2021-37049" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" }, { "db": "NVD", "id": "CVE-2021-37049" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398882" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2021" }, { "date": "2021-12-08T15:15:09.427000", "db": "NVD", "id": "CVE-2021-37049" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398882" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2021" }, { "date": "2021-12-09T17:59:57.660000", "db": "NVD", "id": "CVE-2021-37049" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2021" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015857" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2021" } ], "trust": 0.6 } }
var-202205-0387
Vulnerability from variot
The kernel module has a UAF vulnerability.Successful exploitation of this vulnerability will affect data integrity and availability. Huawei of EMUI and HarmonyOS Exists in a vulnerability related to the use of freed memory.Information is tampered with and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0387", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "cve": "CVE-2022-22260", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-22260", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409789", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-22260", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22260", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-22260", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-22260", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202205-2551", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-409789", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22260", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has a UAF vulnerability.Successful exploitation of this vulnerability will affect data integrity and availability. Huawei of EMUI and HarmonyOS Exists in a vulnerability related to the use of freed memory.Information is tampered with and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22260", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009672", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2551", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-409789", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22260", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "id": "VAR-202205-0387", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409789" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:46.291000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193772" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-RCE " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22260" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22260/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-409789" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-22260" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "date": "2022-05-13T15:15:08.793000", "db": "NVD", "id": "CVE-2022-22260" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-409789" }, { "date": "2022-05-23T00:00:00", "db": "VULMON", "id": "CVE-2022-22260" }, { "date": "2023-08-07T08:15:00", "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "date": "2022-05-23T18:44:20.450000", "db": "NVD", "id": "CVE-2022-22260" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2551" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009672" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2551" } ], "trust": 0.6 } }
var-202112-0346
Vulnerability from variot
There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an authentication vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0346", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" } ] }, "cve": "CVE-2021-37054", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37054", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398887", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37054", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37054", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37054", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37054", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2017", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398887", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" }, { "db": "NVD", "id": "CVE-2021-37054" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an authentication vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "VULHUB", "id": "VHN-398887" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37054", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015862", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2017", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398887", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" }, { "db": "NVD", "id": "CVE-2021-37054" } ] }, "id": "VAR-202112-0346", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398887" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:22:02.764000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Identity\u00a0spoofing\u00a0and\u00a0authentication\u00a0bypass\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173785" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37054" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" }, { "db": "NVD", "id": "CVE-2021-37054" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" }, { "db": "NVD", "id": "CVE-2021-37054" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398887" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2017" }, { "date": "2021-12-08T15:15:09.700000", "db": "NVD", "id": "CVE-2021-37054" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398887" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2017" }, { "date": "2021-12-09T17:52:37.077000", "db": "NVD", "id": "CVE-2021-37054" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2017" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Authentication Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015862" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2017" } ], "trust": 0.6 } }
var-202112-0349
Vulnerability from variot
There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0349", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" } ] }, "cve": "CVE-2021-37051", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37051", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398884", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37051", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37051", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37051", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37051", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2019", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398884", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" }, { "db": "NVD", "id": "CVE-2021-37051" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "VULHUB", "id": "VHN-398884" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37051", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015859", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2019", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398884", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" }, { "db": "NVD", "id": "CVE-2021-37051" } ] }, "id": "VAR-202112-0349", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398884" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:50.431000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Out-of-bounds\u00a0read\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173787" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.6, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37051" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" }, { "db": "NVD", "id": "CVE-2021-37051" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" }, { "db": "NVD", "id": "CVE-2021-37051" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398884" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2019" }, { "date": "2021-12-08T15:15:09.533000", "db": "NVD", "id": "CVE-2021-37051" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398884" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2019" }, { "date": "2021-12-09T17:51:12.040000", "db": "NVD", "id": "CVE-2021-37051" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2019" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds reading vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015859" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2019" } ], "trust": 0.6 } }
var-202112-0348
Vulnerability from variot
There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage. plural Huawei A vulnerability related to exceptional state handling exists in smartphone products.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0348", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" } ] }, "cve": "CVE-2021-37052", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37052", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398885", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37052", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37052", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37052", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37052", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2018", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398885", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" }, { "db": "NVD", "id": "CVE-2021-37052" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage. plural Huawei A vulnerability related to exceptional state handling exists in smartphone products.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "VULHUB", "id": "VHN-398885" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37052", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015860", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2018", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398885", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" }, { "db": "NVD", "id": "CVE-2021-37052" } ] }, "id": "VAR-202112-0348", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398885" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:01:15.718000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Exception\u00a0log\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173786" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-755", "trust": 1.1 }, { "problemtype": "Improper handling in exceptional conditions (CWE-755) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37052" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" }, { "db": "NVD", "id": "CVE-2021-37052" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" }, { "db": "NVD", "id": "CVE-2021-37052" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398885" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2018" }, { "date": "2021-12-08T15:15:09.593000", "db": "NVD", "id": "CVE-2021-37052" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398885" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2018" }, { "date": "2021-12-09T17:53:01.237000", "db": "NVD", "id": "CVE-2021-37052" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2018" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to exceptional state handling in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015860" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2018" } ], "trust": 0.6 } }
var-202112-0252
Vulnerability from variot
There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory overflow and information leakage. Huawei Smartphones contain an array index validation vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS 2.0 has an information disclosure vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0252", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "NVD", "id": "CVE-2021-37062" } ] }, "cve": "CVE-2021-37062", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37062", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398896", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37062", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37062", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37062", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37062", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2044", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398896", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398896" }, { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "CNNVD", "id": "CNNVD-202109-2044" }, { "db": "NVD", "id": "CVE-2021-37062" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory overflow and information leakage. Huawei Smartphones contain an array index validation vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS 2.0 has an information disclosure vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2021-37062" }, { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "VULHUB", "id": "VHN-398896" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37062", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016039", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2044", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-47653", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398896", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398896" }, { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "CNNVD", "id": "CNNVD-202109-2044" }, { "db": "NVD", "id": "CVE-2021-37062" } ] }, "id": "VAR-202112-0252", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398896" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:29.721000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173518" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "CNNVD", "id": "CNNVD-202109-2044" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-129", "trust": 1.1 }, { "problemtype": "Improper validation of array indexes (CWE-129) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398896" }, { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "NVD", "id": "CVE-2021-37062" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37062" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398896" }, { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "CNNVD", "id": "CNNVD-202109-2044" }, { "db": "NVD", "id": "CVE-2021-37062" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398896" }, { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "CNNVD", "id": "CNNVD-202109-2044" }, { "db": "NVD", "id": "CVE-2021-37062" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398896" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2044" }, { "date": "2021-12-07T17:15:08.677000", "db": "NVD", "id": "CVE-2021-37062" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398896" }, { "date": "2022-12-05T07:23:00", "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "date": "2021-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2044" }, { "date": "2021-12-09T17:39:59.487000", "db": "NVD", "id": "CVE-2021-37062" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2044" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to array index validation in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016039" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2044" } ], "trust": 0.6 } }
var-202112-0333
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources. plural Huawei Smartphone products contain an authentication vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0333", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" } ] }, "cve": "CVE-2021-37043", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37043", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398876", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37043", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37043", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37043", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37043", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2064", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398876", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" }, { "db": "NVD", "id": "CVE-2021-37043" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources. plural Huawei Smartphone products contain an authentication vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "VULHUB", "id": "VHN-398876" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37043", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015758", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2064", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398876", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" }, { "db": "NVD", "id": "CVE-2021-37043" } ] }, "id": "VAR-202112-0333", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398876" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:44.623000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173239" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37043" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" }, { "db": "NVD", "id": "CVE-2021-37043" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" }, { "db": "NVD", "id": "CVE-2021-37043" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398876" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2064" }, { "date": "2021-12-07T17:15:08.387000", "db": "NVD", "id": "CVE-2021-37043" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398876" }, { "date": "2022-11-30T01:35:00", "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2064" }, { "date": "2021-12-09T17:48:30.133000", "db": "NVD", "id": "CVE-2021-37043" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2064" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Authentication Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015758" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2064" } ], "trust": 0.6 } }
var-202111-1774
Vulnerability from variot
The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart. HarmonyOS contains a type confusion vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1774", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "NVD", "id": "CVE-2021-39987" } ] }, "cve": "CVE-2021-39987", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-39987", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401388", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-39987", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39987", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39987", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39987", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-2126", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401388", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401388" }, { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "CNNVD", "id": "CNNVD-202111-2126" }, { "db": "NVD", "id": "CVE-2021-39987" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart. HarmonyOS contains a type confusion vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-39987" }, { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "VULHUB", "id": "VHN-401388" }, { "db": "VULMON", "id": "CVE-2021-39987" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39987", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017727", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2126", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08312", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401388", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39987", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401388" }, { "db": "VULMON", "id": "CVE-2021-39987" }, { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "CNNVD", "id": "CNNVD-202111-2126" }, { "db": "NVD", "id": "CVE-2021-39987" } ] }, "id": "VAR-202111-1774", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401388" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:30.017000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176787" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "CNNVD", "id": "CNNVD-202111-2126" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-843", "trust": 1.1 }, { "problemtype": "Mistake of type (CWE-843) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401388" }, { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "NVD", "id": "CVE-2021-39987" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39987" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401388" }, { "db": "VULMON", "id": "CVE-2021-39987" }, { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "CNNVD", "id": "CNNVD-202111-2126" }, { "db": "NVD", "id": "CVE-2021-39987" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401388" }, { "db": "VULMON", "id": "CVE-2021-39987" }, { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "CNNVD", "id": "CNNVD-202111-2126" }, { "db": "NVD", "id": "CVE-2021-39987" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401388" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39987" }, { "date": "2023-02-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2126" }, { "date": "2022-01-03T22:15:10.890000", "db": "NVD", "id": "CVE-2021-39987" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-14T00:00:00", "db": "VULHUB", "id": "VHN-401388" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39987" }, { "date": "2023-02-02T02:30:00", "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2126" }, { "date": "2022-01-14T15:51:23.237000", "db": "NVD", "id": "CVE-2021-39987" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2126" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability regarding mix-ups in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017727" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2126" } ], "trust": 0.6 } }
var-202110-1455
Vulnerability from variot
A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause system Soft Restart. HarmonyOS Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1455", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "NVD", "id": "CVE-2021-22464" } ] }, "cve": "CVE-2021-22464", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-22464", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380899", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22464", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22464", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22464", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2021-22464", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202110-2056", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-380899", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380899" }, { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "CNNVD", "id": "CNNVD-202110-2056" }, { "db": "NVD", "id": "CVE-2021-22464" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause system Soft Restart. HarmonyOS Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22464" }, { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "VULHUB", "id": "VHN-380899" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22464", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014247", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2056", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380899", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380899" }, { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "CNNVD", "id": "CNNVD-202110-2056" }, { "db": "NVD", "id": "CVE-2021-22464" } ] }, "id": "VAR-202110-1455", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380899" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:25:09.171000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171510" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "CNNVD", "id": "CNNVD-202110-2056" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380899" }, { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "NVD", "id": "CVE-2021-22464" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22464" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380899" }, { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "CNNVD", "id": "CNNVD-202110-2056" }, { "db": "NVD", "id": "CVE-2021-22464" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380899" }, { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "CNNVD", "id": "CNNVD-202110-2056" }, { "db": "NVD", "id": "CVE-2021-22464" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380899" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2056" }, { "date": "2021-10-28T13:15:09.397000", "db": "NVD", "id": "CVE-2021-22464" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380899" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2056" }, { "date": "2021-11-01T19:24:29.067000", "db": "NVD", "id": "CVE-2021-22464" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2056" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014247" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2056" } ], "trust": 0.6 } }
var-202210-0380
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0380", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "NVD", "id": "CVE-2022-41600" } ] }, "cve": "CVE-2022-41600", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "id": "CVE-2022-41600", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41600", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41600", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2022-41600", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202210-152", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "CNNVD", "id": "CNNVD-202210-152" }, { "db": "NVD", "id": "CVE-2022-41600" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41600" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "VULHUB", "id": "VHN-437846" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41600", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018788", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-152", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437846", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437846" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "CNNVD", "id": "CNNVD-202210-152" }, { "db": "NVD", "id": "CVE-2022-41600" } ] }, "id": "VAR-202210-0380", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437846" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:00:44.945000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210786" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437846" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "NVD", "id": "CVE-2022-41600" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41600" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41600/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437846" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "CNNVD", "id": "CNNVD-202210-152" }, { "db": "NVD", "id": "CVE-2022-41600" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437846" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "CNNVD", "id": "CNNVD-202210-152" }, { "db": "NVD", "id": "CVE-2022-41600" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437846" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-152" }, { "date": "2022-10-14T16:15:28.970000", "db": "NVD", "id": "CVE-2022-41600" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437846" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-152" }, { "date": "2022-10-15T01:56:34.470000", "db": "NVD", "id": "CVE-2022-41600" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-152" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018788" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-152" } ], "trust": 0.6 } }
var-202112-0354
Vulnerability from variot
There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0354", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" } ] }, "cve": "CVE-2021-37039", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CVE-2021-37039", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-398872", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2021-37039", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37039", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37039", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-37039", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202109-2035", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398872", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" }, { "db": "NVD", "id": "CVE-2021-37039" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "VULHUB", "id": "VHN-398872" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37039", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015890", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2035", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08330", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398872", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" }, { "db": "NVD", "id": "CVE-2021-37039" } ] }, "id": "VAR-202112-0354", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398872" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:44.598000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Input\u00a0verification\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173793" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37039" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" }, { "db": "NVD", "id": "CVE-2021-37039" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" }, { "db": "NVD", "id": "CVE-2021-37039" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398872" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2035" }, { "date": "2021-12-08T15:15:09.210000", "db": "NVD", "id": "CVE-2021-37039" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398872" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2035" }, { "date": "2021-12-09T17:52:24.587000", "db": "NVD", "id": "CVE-2021-37039" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2035" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015890" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2035" } ], "trust": 0.6 } }
var-202302-0347
Vulnerability from variot
The phone-PC collaboration module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality and integrity. HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0347", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "NVD", "id": "CVE-2022-48290" } ] }, "cve": "CVE-2022-48290", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-48290", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48290", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48290", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-48290", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202302-340", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "CNNVD", "id": "CNNVD-202302-340" }, { "db": "NVD", "id": "CVE-2022-48290" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phone-PC collaboration module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality and integrity. HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-48290" }, { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "VULHUB", "id": "VHN-453370" }, { "db": "VULMON", "id": "CVE-2022-48290" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48290", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003377", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-340", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453370", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48290", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453370" }, { "db": "VULMON", "id": "CVE-2022-48290" }, { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "CNNVD", "id": "CNNVD-202302-340" }, { "db": "NVD", "id": "CVE-2022-48290" } ] }, "id": "VAR-202302-0347", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453370" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:19.014000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225742" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2022-48290 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-48290" }, { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "CNNVD", "id": "CNNVD-202302-340" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "NVD", "id": "CVE-2022-48290" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48290" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48290/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48290" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453370" }, { "db": "VULMON", "id": "CVE-2022-48290" }, { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "CNNVD", "id": "CNNVD-202302-340" }, { "db": "NVD", "id": "CVE-2022-48290" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453370" }, { "db": "VULMON", "id": "CVE-2022-48290" }, { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "CNNVD", "id": "CNNVD-202302-340" }, { "db": "NVD", "id": "CVE-2022-48290" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453370" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48290" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-340" }, { "date": "2023-02-09T17:15:13.053000", "db": "NVD", "id": "CVE-2022-48290" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453370" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48290" }, { "date": "2023-09-07T01:50:00", "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-340" }, { "date": "2023-02-16T19:08:47.413000", "db": "NVD", "id": "CVE-2022-48290" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-340" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003377" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-340" } ], "trust": 0.6 } }
var-202210-0466
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0466", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "NVD", "id": "CVE-2022-41595" } ] }, "cve": "CVE-2022-41595", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "id": "CVE-2022-41595", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41595", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41595", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2022-41595", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202210-155", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "CNNVD", "id": "CNNVD-202210-155" }, { "db": "NVD", "id": "CVE-2022-41595" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41595" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "VULHUB", "id": "VHN-437835" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41595", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018791", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-155", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437835", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437835" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "CNNVD", "id": "CNNVD-202210-155" }, { "db": "NVD", "id": "CVE-2022-41595" } ] }, "id": "VAR-202210-0466", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437835" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:02:20.312000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210789" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.0 }, { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437835" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "NVD", "id": "CVE-2022-41595" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41595" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41595/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437835" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "CNNVD", "id": "CNNVD-202210-155" }, { "db": "NVD", "id": "CVE-2022-41595" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437835" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "CNNVD", "id": "CNNVD-202210-155" }, { "db": "NVD", "id": "CVE-2022-41595" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437835" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-155" }, { "date": "2022-10-14T16:15:27.523000", "db": "NVD", "id": "CVE-2022-41595" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437835" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-155" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2022-41595" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-155" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018791" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-155" } ], "trust": 0.6 } }
var-202108-2287
Vulnerability from variot
There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2287", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" } ] }, "cve": "CVE-2021-22395", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22395", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380830", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-22395", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22395", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22395", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22395", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202108-2827", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380830", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" }, { "db": "NVD", "id": "CVE-2021-22395" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "VULHUB", "id": "VHN-380830" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22395", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018586", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-2827", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380830", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" }, { "db": "NVD", "id": "CVE-2021-22395" } ] }, "id": "VAR-202108-2287", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380830" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:38.743000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202108-0000001181125881 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172026" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "Code injection (CWE-94) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22395" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22395/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" }, { "db": "NVD", "id": "CVE-2021-22395" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" }, { "db": "NVD", "id": "CVE-2021-22395" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380830" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2827" }, { "date": "2022-02-25T19:15:09.070000", "db": "NVD", "id": "CVE-2021-22395" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380830" }, { "date": "2023-06-30T08:27:00", "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2827" }, { "date": "2022-03-07T17:44:53.277000", "db": "NVD", "id": "CVE-2021-22395" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2827" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Code injection vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018586" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2827" } ], "trust": 0.6 } }
var-202201-1063
Vulnerability from variot
The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in a buffer error vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Successful exploitation of this vulnerability could result in compromised confidentiality. No detailed vulnerability details are currently available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1063", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "NVD", "id": "CVE-2021-40027" } ] }, "cve": "CVE-2021-40027", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40027", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401428", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40027", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40027", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40027", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40027", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202201-274", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401428", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401428" }, { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "CNNVD", "id": "CNNVD-202201-274" }, { "db": "NVD", "id": "CVE-2021-40027" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in a buffer error vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Successful exploitation of this vulnerability could result in compromised confidentiality. No detailed vulnerability details are currently available", "sources": [ { "db": "NVD", "id": "CVE-2021-40027" }, { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "VULHUB", "id": "VHN-401428" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40027", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005843", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-274", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-12806", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401428", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401428" }, { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "CNNVD", "id": "CNNVD-202201-274" }, { "db": "NVD", "id": "CVE-2021-40027" } ] }, "id": "VAR-202201-1063", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401428" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:56.606000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=177994" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "CNNVD", "id": "CNNVD-202201-274" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.0 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401428" }, { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "NVD", "id": "CVE-2021-40027" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.6, "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "trust": 1.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40027" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202307-0000001587168858" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401428" }, { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "CNNVD", "id": "CNNVD-202201-274" }, { "db": "NVD", "id": "CVE-2021-40027" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401428" }, { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "CNNVD", "id": "CNNVD-202201-274" }, { "db": "NVD", "id": "CVE-2021-40027" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401428" }, { "date": "2023-06-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-274" }, { "date": "2022-01-10T14:10:21.810000", "db": "NVD", "id": "CVE-2021-40027" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401428" }, { "date": "2023-06-15T03:05:00", "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "date": "2023-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-274" }, { "date": "2023-07-06T14:15:10.380000", "db": "NVD", "id": "CVE-2021-40027" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-274" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Buffer error vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005843" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-274" } ], "trust": 0.6 } }
var-202202-0615
Vulnerability from variot
There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality. EMUI , HarmonyOS , Magic UI Exists in a digital signature verification vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0615", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "cve": "CVE-2021-40045", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-40045", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-401446", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-40045", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40045", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40045", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-40045", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202202-442", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401446", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-40045", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality. EMUI , HarmonyOS , Magic UI Exists in a digital signature verification vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40045", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-005383", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-442", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401446", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40045", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "id": "VAR-202202-0615", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401446" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:58.962000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202202-0000001204253396 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "title": "Huawei HarmonyOS Repair measures for data forgery problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=182401" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-347", "trust": 1.1 }, { "problemtype": "Improper verification of digital signatures (CWE-347) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40045" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202202-0000001203413350" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/347.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401446" }, { "date": "2022-02-09T00:00:00", "db": "VULMON", "id": "CVE-2021-40045" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "date": "2022-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-442" }, { "date": "2022-02-09T23:15:16.397000", "db": "NVD", "id": "CVE-2021-40045" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-16T00:00:00", "db": "VULHUB", "id": "VHN-401446" }, { "date": "2022-02-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40045" }, { "date": "2023-05-30T04:45:00", "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-442" }, { "date": "2022-02-16T02:33:08.603000", "db": "NVD", "id": "CVE-2021-40045" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-442" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Digital Signature Verification Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005383" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-442" } ], "trust": 0.6 } }
var-202211-0417
Vulnerability from variot
The SmartTrimProcessEvent module has a vulnerability of obtaining the read and write permissions on arbitrary system files. Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0417", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44557" } ] }, "cve": "CVE-2022-44557", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-44557", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44557", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2129", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2129" }, { "db": "NVD", "id": "CVE-2022-44557" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SmartTrimProcessEvent module has a vulnerability of obtaining the read and write permissions on arbitrary system files. Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-44557" }, { "db": "VULHUB", "id": "VHN-441945" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44557", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2129", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441945", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441945" }, { "db": "CNNVD", "id": "CNNVD-202211-2129" }, { "db": "NVD", "id": "CVE-2022-44557" } ] }, "id": "VAR-202211-0417", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441945" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:29.304000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=214356" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44557" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44557" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44557/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441945" }, { "db": "CNNVD", "id": "CNNVD-202211-2129" }, { "db": "NVD", "id": "CVE-2022-44557" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441945" }, { "db": "CNNVD", "id": "CNNVD-202211-2129" }, { "db": "NVD", "id": "CVE-2022-44557" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441945" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2129" }, { "date": "2022-11-09T21:15:18.617000", "db": "NVD", "id": "CVE-2022-44557" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441945" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2129" }, { "date": "2022-11-14T19:10:30.747000", "db": "NVD", "id": "CVE-2022-44557" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2129" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2129" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2129" } ], "trust": 0.6 } }
var-202209-0585
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0585", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" } ] }, "cve": "CVE-2022-38997", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38997", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38997", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38997", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-38997", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-173", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "CNNVD", "id": "CNNVD-202209-173" }, { "db": "NVD", "id": "CVE-2022-38997" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "VULHUB", "id": "VHN-434768" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38997", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016782", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-173", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434768", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434768" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "CNNVD", "id": "CNNVD-202209-173" }, { "db": "NVD", "id": "CVE-2022-38997" } ] }, "id": "VAR-202209-0585", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434768" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:42:14.282000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208081" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38997" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38997/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434768" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "CNNVD", "id": "CNNVD-202209-173" }, { "db": "NVD", "id": "CVE-2022-38997" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434768" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "CNNVD", "id": "CNNVD-202209-173" }, { "db": "NVD", "id": "CVE-2022-38997" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434768" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-173" }, { "date": "2022-09-16T18:15:17.820000", "db": "NVD", "id": "CVE-2022-38997" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-434768" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-173" }, { "date": "2022-09-17T03:47:48.817000", "db": "NVD", "id": "CVE-2022-38997" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-173" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-173" } ], "trust": 0.6 } }
var-202112-0391
Vulnerability from variot
There is a Uncontrolled Resource Consumption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Screen projection application denial of service. Huawei Smartphones have a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0391", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "NVD", "id": "CVE-2021-37061" } ] }, "cve": "CVE-2021-37061", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37061", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398895", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37061", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37061", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37061", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37061", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2034", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398895", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398895" }, { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "CNNVD", "id": "CNNVD-202109-2034" }, { "db": "NVD", "id": "CVE-2021-37061" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Uncontrolled Resource Consumption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Screen projection application denial of service. Huawei Smartphones have a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37061" }, { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "VULHUB", "id": "VHN-398895" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37061", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016042", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2034", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398895", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398895" }, { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "CNNVD", "id": "CNNVD-202109-2034" }, { "db": "NVD", "id": "CVE-2021-37061" } ] }, "id": "VAR-202112-0391", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398895" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:50.405000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173511" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "CNNVD", "id": "CNNVD-202109-2034" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "Resource exhaustion (CWE-400) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398895" }, { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "NVD", "id": "CVE-2021-37061" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37061" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398895" }, { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "CNNVD", "id": "CNNVD-202109-2034" }, { "db": "NVD", "id": "CVE-2021-37061" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398895" }, { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "CNNVD", "id": "CNNVD-202109-2034" }, { "db": "NVD", "id": "CVE-2021-37061" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398895" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2034" }, { "date": "2021-12-07T17:15:08.633000", "db": "NVD", "id": "CVE-2021-37061" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-10T00:00:00", "db": "VULHUB", "id": "VHN-398895" }, { "date": "2022-12-05T07:27:00", "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "date": "2021-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2034" }, { "date": "2021-12-10T20:07:02.807000", "db": "NVD", "id": "CVE-2021-37061" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2034" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Resource Exhaustion Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016042" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2034" } ], "trust": 0.6 } }
var-202108-0290
Vulnerability from variot
A component of the HarmonyOS has a Kernel Memory Leakage Vulnerability. Local attackers may exploit this vulnerability to cause Kernel Denial of Service. HarmonyOS Is vulnerable to a lack of free memory after expiration.Denial of service (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0290", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "NVD", "id": "CVE-2021-22424" } ] }, "cve": "CVE-2021-22424", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22424", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380859", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22424", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22424", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22424", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22424", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202108-323", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380859", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22424", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380859" }, { "db": "VULMON", "id": "CVE-2021-22424" }, { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "CNNVD", "id": "CNNVD-202108-323" }, { "db": "NVD", "id": "CVE-2021-22424" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Kernel Memory Leakage Vulnerability. Local attackers may exploit this vulnerability to cause Kernel Denial of Service. HarmonyOS Is vulnerable to a lack of free memory after expiration.Denial of service (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22424" }, { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "VULHUB", "id": "VHN-380859" }, { "db": "VULMON", "id": "CVE-2021-22424" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22424", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009363", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-323", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380859", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22424", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380859" }, { "db": "VULMON", "id": "CVE-2021-22424" }, { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "CNNVD", "id": "CNNVD-202108-323" }, { "db": "NVD", "id": "CVE-2021-22424" } ] }, "id": "VAR-202108-0290", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380859" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:01:22.079000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=159652" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "CNNVD", "id": "CNNVD-202108-323" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of free memory after expiration (CWE-401) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380859" }, { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "NVD", "id": "CVE-2021-22424" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22424" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/401.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380859" }, { "db": "VULMON", "id": "CVE-2021-22424" }, { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "CNNVD", "id": "CNNVD-202108-323" }, { "db": "NVD", "id": "CVE-2021-22424" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380859" }, { "db": "VULMON", "id": "CVE-2021-22424" }, { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "CNNVD", "id": "CNNVD-202108-323" }, { "db": "NVD", "id": "CVE-2021-22424" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380859" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22424" }, { "date": "2022-04-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-323" }, { "date": "2021-08-03T18:15:08.267000", "db": "NVD", "id": "CVE-2021-22424" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-380859" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22424" }, { "date": "2022-04-21T08:37:00", "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-323" }, { "date": "2021-08-11T13:14:46.847000", "db": "NVD", "id": "CVE-2021-22424" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-323" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerabilities in lack of free memory after expiration", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009363" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-323" } ], "trust": 0.6 } }
var-202201-1018
Vulnerability from variot
There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity. Huawei EMUI , HarmonyOS , Magic UI Exists in a resource exhaustion vulnerability.Information may be tampered with. The Huawei Smartphone is a smartphone from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1018", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "2.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" } ] }, "cve": "CVE-2021-40011", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40011", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-03943", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401412", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40011", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40011", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40011", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40011", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2022-03943", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-566", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401412", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "CNNVD", "id": "CNNVD-202201-566" }, { "db": "NVD", "id": "CVE-2021-40011" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity. Huawei EMUI , HarmonyOS , Magic UI Exists in a resource exhaustion vulnerability.Information may be tampered with. The Huawei Smartphone is a smartphone from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40011", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-002890", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-03943", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202201-566", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401412", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "CNNVD", "id": "CNNVD-202201-566" }, { "db": "NVD", "id": "CVE-2021-40011" } ] }, "id": "VAR-202201-1018", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" } ] }, "last_update_date": "2024-08-14T14:31:23.719000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0March\u00a02022", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "title": "Patch for HuaWei smartphone denial of service vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/313801" }, { "title": "Huawei Smartphone Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=178042" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "Resource exhaustion (CWE-400) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40011" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "CNNVD", "id": "CNNVD-202201-566" }, { "db": "NVD", "id": "CVE-2021-40011" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "CNNVD", "id": "CNNVD-202201-566" }, { "db": "NVD", "id": "CVE-2021-40011" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-15T00:00:00", "db": "CNVD", "id": "CNVD-2022-03943" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401412" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "date": "2022-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-566" }, { "date": "2022-01-10T14:10:21.407000", "db": "NVD", "id": "CVE-2021-40011" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-15T00:00:00", "db": "CNVD", "id": "CNVD-2022-03943" }, { "date": "2022-04-25T00:00:00", "db": "VULHUB", "id": "VHN-401412" }, { "date": "2023-01-24T03:30:00", "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "date": "2022-04-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-566" }, { "date": "2022-04-25T17:57:56.870000", "db": "NVD", "id": "CVE-2021-40011" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-566" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product resource exhaustion vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002890" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-566" } ], "trust": 0.6 } }
var-202110-1867
Vulnerability from variot
MyHuawei-App has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could compromise confidentiality. HarmonyOS There is a vulnerability related to information leakage.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1867", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "NVD", "id": "CVE-2021-39972" } ] }, "cve": "CVE-2021-39972", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-39972", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401373", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-39972", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39972", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39972", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39972", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2214", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401373", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401373" }, { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "CNNVD", "id": "CNNVD-202110-2214" }, { "db": "NVD", "id": "CVE-2021-39972" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "MyHuawei-App has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could compromise confidentiality. HarmonyOS There is a vulnerability related to information leakage.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-39972" }, { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "VULHUB", "id": "VHN-401373" }, { "db": "VULMON", "id": "CVE-2021-39972" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39972", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017609", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2214", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401373", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39972", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401373" }, { "db": "VULMON", "id": "CVE-2021-39972" }, { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "CNNVD", "id": "CNNVD-202110-2214" }, { "db": "NVD", "id": "CVE-2021-39972" } ] }, "id": "VAR-202110-1867", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401373" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:43:15.980000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176762" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "CNNVD", "id": "CNNVD-202110-2214" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 }, { "problemtype": "information leak (CWE-200) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401373" }, { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "NVD", "id": "CVE-2021-39972" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39972" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401373" }, { "db": "VULMON", "id": "CVE-2021-39972" }, { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "CNNVD", "id": "CNNVD-202110-2214" }, { "db": "NVD", "id": "CVE-2021-39972" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401373" }, { "db": "VULMON", "id": "CVE-2021-39972" }, { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "CNNVD", "id": "CNNVD-202110-2214" }, { "db": "NVD", "id": "CVE-2021-39972" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401373" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39972" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2214" }, { "date": "2022-01-03T22:15:10.237000", "db": "NVD", "id": "CVE-2021-39972" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401373" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39972" }, { "date": "2023-01-27T07:03:00", "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2214" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-39972" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2214" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability regarding information leakage in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017609" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2214" } ], "trust": 0.6 } }
var-202108-0284
Vulnerability from variot
A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause the underlying trust of the application trustlist mechanism is missing.. HarmonyOS Exists in a vulnerability in externally controllable references to resources in another region.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0284", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "NVD", "id": "CVE-2021-22420" } ] }, "cve": "CVE-2021-22420", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2021-22420", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380855", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22420", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22420", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22420", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22420", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202108-317", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380855", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22420", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380855" }, { "db": "VULMON", "id": "CVE-2021-22420" }, { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "CNNVD", "id": "CNNVD-202108-317" }, { "db": "NVD", "id": "CVE-2021-22420" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause the underlying trust of the application trustlist mechanism is missing.. HarmonyOS Exists in a vulnerability in externally controllable references to resources in another region.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22420" }, { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "VULHUB", "id": "VHN-380855" }, { "db": "VULMON", "id": "CVE-2021-22420" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22420", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009369", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-317", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380855", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22420", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380855" }, { "db": "VULMON", "id": "CVE-2021-22420" }, { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "CNNVD", "id": "CNNVD-202108-317" }, { "db": "NVD", "id": "CVE-2021-22420" } ] }, "id": "VAR-202108-0284", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380855" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:59.628000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=159648" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "CNNVD", "id": "CNNVD-202108-317" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.1 }, { "problemtype": "Externally controllable reference to another region resource (CWE-610) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380855" }, { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "NVD", "id": "CVE-2021-22420" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22420" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/610.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380855" }, { "db": "VULMON", "id": "CVE-2021-22420" }, { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "CNNVD", "id": "CNNVD-202108-317" }, { "db": "NVD", "id": "CVE-2021-22420" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380855" }, { "db": "VULMON", "id": "CVE-2021-22420" }, { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "CNNVD", "id": "CNNVD-202108-317" }, { "db": "NVD", "id": "CVE-2021-22420" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380855" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22420" }, { "date": "2022-04-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-317" }, { "date": "2021-08-03T18:15:08.127000", "db": "NVD", "id": "CVE-2021-22420" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-380855" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22420" }, { "date": "2022-04-21T08:56:00", "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-317" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-22420" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-317" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in externally controllable reference to another area resource in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009369" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-317" } ], "trust": 0.6 } }
var-202209-0200
Vulnerability from variot
Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0200", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "NVD", "id": "CVE-2021-40024" } ] }, "cve": "CVE-2021-40024", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40024", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40024", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40024", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40024", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-217", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "CNNVD", "id": "CNNVD-202209-217" }, { "db": "NVD", "id": "CVE-2021-40024" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2021-40024" }, { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "VULHUB", "id": "VHN-401425" }, { "db": "VULMON", "id": "CVE-2021-40024" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40024", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-020314", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-217", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-81254", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401425", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40024", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401425" }, { "db": "VULMON", "id": "CVE-2021-40024" }, { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "CNNVD", "id": "CNNVD-202209-217" }, { "db": "NVD", "id": "CVE-2021-40024" } ] }, "id": "VAR-202209-0200", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401425" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:27.095000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208411" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "NVD", "id": "CVE-2021-40024" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40024" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40024/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401425" }, { "db": "VULMON", "id": "CVE-2021-40024" }, { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "CNNVD", "id": "CNNVD-202209-217" }, { "db": "NVD", "id": "CVE-2021-40024" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401425" }, { "db": "VULMON", "id": "CVE-2021-40024" }, { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "CNNVD", "id": "CNNVD-202209-217" }, { "db": "NVD", "id": "CVE-2021-40024" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-401425" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40024" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-217" }, { "date": "2022-09-16T18:15:11.580000", "db": "NVD", "id": "CVE-2021-40024" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-401425" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40024" }, { "date": "2023-10-11T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-217" }, { "date": "2022-09-20T16:58:52.297000", "db": "NVD", "id": "CVE-2021-40024" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-217" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020314" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-217" } ], "trust": 0.6 } }
var-202209-0123
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0123", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" } ] }, "cve": "CVE-2022-38987", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-38987", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38987", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38987", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-38987", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-201", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "CNNVD", "id": "CNNVD-202209-201" }, { "db": "NVD", "id": "CVE-2022-38987" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "VULHUB", "id": "VHN-428495" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38987", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016792", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-201", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428495", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428495" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "CNNVD", "id": "CNNVD-202209-201" }, { "db": "NVD", "id": "CVE-2022-38987" } ] }, "id": "VAR-202209-0123", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428495" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:42:14.607000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208093" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38987" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38987/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428495" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "CNNVD", "id": "CNNVD-202209-201" }, { "db": "NVD", "id": "CVE-2022-38987" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428495" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "CNNVD", "id": "CNNVD-202209-201" }, { "db": "NVD", "id": "CVE-2022-38987" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428495" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-201" }, { "date": "2022-09-16T18:15:17.437000", "db": "NVD", "id": "CVE-2022-38987" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428495" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-201" }, { "date": "2022-09-17T03:46:36.700000", "db": "NVD", "id": "CVE-2022-38987" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-201" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-201" } ], "trust": 0.6 } }
var-202112-0342
Vulnerability from variot
There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability is caused by a component of the product that does not effectively authenticate user identities. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0342", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" } ] }, "cve": "CVE-2021-37093", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37093", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398929", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2021-37093", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37093", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37093", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-37093", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202109-2028", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398929", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" }, { "db": "NVD", "id": "CVE-2021-37093" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability is caused by a component of the product that does not effectively authenticate user identities. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "VULHUB", "id": "VHN-398929" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37093", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015867", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2028", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08327", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398929", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" }, { "db": "NVD", "id": "CVE-2021-37093" } ] }, "id": "VAR-202112-0342", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398929" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:50:03.418000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Improper\u00a0access\u00a0control\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173791" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37093" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" }, { "db": "NVD", "id": "CVE-2021-37093" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" }, { "db": "NVD", "id": "CVE-2021-37093" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398929" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2028" }, { "date": "2021-12-08T15:15:09.973000", "db": "NVD", "id": "CVE-2021-37093" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398929" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2028" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37093" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2028" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2028" } ], "trust": 0.6 } }
var-202112-0258
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to device cannot be used properly. Huawei Smartphone products contain an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0258", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "NVD", "id": "CVE-2021-37014" } ] }, "cve": "CVE-2021-37014", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37014", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398846", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37014", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37014", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37014", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37014", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2051", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398846", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398846" }, { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "CNNVD", "id": "CNNVD-202109-2051" }, { "db": "NVD", "id": "CVE-2021-37014" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to device cannot be used properly. Huawei Smartphone products contain an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37014" }, { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "VULHUB", "id": "VHN-398846" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37014", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015761", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2051", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398846", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398846" }, { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "CNNVD", "id": "CNNVD-202109-2051" }, { "db": "NVD", "id": "CVE-2021-37014" } ] }, "id": "VAR-202112-0258", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398846" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:50:03.484000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173231" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "CNNVD", "id": "CNNVD-202109-2051" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-190", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398846" }, { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "NVD", "id": "CVE-2021-37014" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37014" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398846" }, { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "CNNVD", "id": "CNNVD-202109-2051" }, { "db": "NVD", "id": "CVE-2021-37014" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398846" }, { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "CNNVD", "id": "CNNVD-202109-2051" }, { "db": "NVD", "id": "CVE-2021-37014" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398846" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2051" }, { "date": "2021-12-07T17:15:08.260000", "db": "NVD", "id": "CVE-2021-37014" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398846" }, { "date": "2022-11-30T01:47:00", "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2051" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37014" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2051" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Integer overflow vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015761" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2051" } ], "trust": 0.6 } }
var-202108-0285
Vulnerability from variot
A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to cause further Elevation of Privileges. HarmonyOS Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0285", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "NVD", "id": "CVE-2021-22421" } ] }, "cve": "CVE-2021-22421", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2021-22421", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380856", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22421", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22421", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22421", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22421", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202108-318", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380856", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22421", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380856" }, { "db": "VULMON", "id": "CVE-2021-22421" }, { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "CNNVD", "id": "CNNVD-202108-318" }, { "db": "NVD", "id": "CVE-2021-22421" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to cause further Elevation of Privileges. HarmonyOS Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22421" }, { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "VULHUB", "id": "VHN-380856" }, { "db": "VULMON", "id": "CVE-2021-22421" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22421", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009367", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-318", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380856", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22421", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380856" }, { "db": "VULMON", "id": "CVE-2021-22421" }, { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "CNNVD", "id": "CNNVD-202108-318" }, { "db": "NVD", "id": "CVE-2021-22421" } ] }, "id": "VAR-202108-0285", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380856" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:43:26.026000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Fixes for configuration error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=159649" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "CNNVD", "id": "CNNVD-202108-318" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380856" }, { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "NVD", "id": "CVE-2021-22421" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22421" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/269.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380856" }, { "db": "VULMON", "id": "CVE-2021-22421" }, { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "CNNVD", "id": "CNNVD-202108-318" }, { "db": "NVD", "id": "CVE-2021-22421" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380856" }, { "db": "VULMON", "id": "CVE-2021-22421" }, { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "CNNVD", "id": "CNNVD-202108-318" }, { "db": "NVD", "id": "CVE-2021-22421" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380856" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22421" }, { "date": "2022-04-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-318" }, { "date": "2021-08-03T18:15:08.157000", "db": "NVD", "id": "CVE-2021-22421" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-380856" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22421" }, { "date": "2022-04-21T08:53:00", "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-318" }, { "date": "2021-08-11T13:32:19.737000", "db": "NVD", "id": "CVE-2021-22421" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-318" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in privilege management", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009367" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "configuration error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-318" } ], "trust": 0.6 } }
var-202112-0944
Vulnerability from variot
There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0944", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" } ] }, "cve": "CVE-2021-39996", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-39996", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-05170", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401397", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-39996", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39996", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39996", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-39996", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2022-05170", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-214", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401397", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "CNNVD", "id": "CNNVD-202112-214" }, { "db": "NVD", "id": "CVE-2021-39996" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39996", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017522", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05170", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-214", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401397", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "CNNVD", "id": "CNNVD-202112-214" }, { "db": "NVD", "id": "CVE-2021-39996" } ] }, "id": "VAR-202112-0944", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" } ] }, "last_update_date": "2024-08-14T14:18:13.037000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Huawei HarmonyOS Wearables Heap Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/315096" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172738" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39996" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "CNNVD", "id": "CNNVD-202112-214" }, { "db": "NVD", "id": "CVE-2021-39996" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "CNNVD", "id": "CNNVD-202112-214" }, { "db": "NVD", "id": "CVE-2021-39996" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05170" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401397" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-214" }, { "date": "2022-01-10T14:10:20.823000", "db": "NVD", "id": "CVE-2021-39996" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05170" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401397" }, { "date": "2023-01-24T06:07:00", "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-214" }, { "date": "2022-01-13T02:13:52.250000", "db": "NVD", "id": "CVE-2021-39996" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-214" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017522" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-214" } ], "trust": 0.6 } }
var-202112-0250
Vulnerability from variot
There is a Improper Limitation of a Pathname to a Restricted Directory vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to arbitrary file created. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Applications module of Huawei HarmonyOS 2.0 has a directory traversal vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0250", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "NVD", "id": "CVE-2021-37064" } ] }, "cve": "CVE-2021-37064", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37064", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398898", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37064", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37064", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37064", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37064", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2014", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398898", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398898" }, { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "CNNVD", "id": "CNNVD-202109-2014" }, { "db": "NVD", "id": "CVE-2021-37064" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Limitation of a Pathname to a Restricted Directory vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to arbitrary file created. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Applications module of Huawei HarmonyOS 2.0 has a directory traversal vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2021-37064" }, { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "VULHUB", "id": "VHN-398898" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37064", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016033", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2014", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44617", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398898", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398898" }, { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "CNNVD", "id": "CNNVD-202109-2014" }, { "db": "NVD", "id": "CVE-2021-37064" } ] }, "id": "VAR-202112-0250", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398898" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:18:13.687000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173493" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "CNNVD", "id": "CNNVD-202109-2014" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398898" }, { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "NVD", "id": "CVE-2021-37064" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37064" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398898" }, { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "CNNVD", "id": "CNNVD-202109-2014" }, { "db": "NVD", "id": "CVE-2021-37064" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398898" }, { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "CNNVD", "id": "CNNVD-202109-2014" }, { "db": "NVD", "id": "CVE-2021-37064" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398898" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2014" }, { "date": "2021-12-07T17:15:08.760000", "db": "NVD", "id": "CVE-2021-37064" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398898" }, { "date": "2022-12-05T07:15:00", "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2014" }, { "date": "2021-12-09T17:56:15.823000", "db": "NVD", "id": "CVE-2021-37064" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2014" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Path Traversal Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016033" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2014" } ], "trust": 0.6 } }
var-202110-1453
Vulnerability from variot
A component of the HarmonyOS has a Use After Free vulnerability. Local attackers may exploit this vulnerability to cause kernel crash. HarmonyOS Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1453", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "NVD", "id": "CVE-2021-22466" } ] }, "cve": "CVE-2021-22466", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22466", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380901", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22466", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22466", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22466", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22466", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2058", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380901", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380901" }, { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "CNNVD", "id": "CNNVD-202110-2058" }, { "db": "NVD", "id": "CVE-2021-22466" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Use After Free vulnerability. Local attackers may exploit this vulnerability to cause kernel crash. HarmonyOS Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22466" }, { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "VULHUB", "id": "VHN-380901" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22466", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014249", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2058", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380901", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380901" }, { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "CNNVD", "id": "CNNVD-202110-2058" }, { "db": "NVD", "id": "CVE-2021-22466" } ] }, "id": "VAR-202110-1453", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380901" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:33:02.164000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171522" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "CNNVD", "id": "CNNVD-202110-2058" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380901" }, { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "NVD", "id": "CVE-2021-22466" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22466" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380901" }, { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "CNNVD", "id": "CNNVD-202110-2058" }, { "db": "NVD", "id": "CVE-2021-22466" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380901" }, { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "CNNVD", "id": "CNNVD-202110-2058" }, { "db": "NVD", "id": "CVE-2021-22466" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380901" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2058" }, { "date": "2021-10-28T13:15:09.493000", "db": "NVD", "id": "CVE-2021-22466" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380901" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2058" }, { "date": "2021-11-01T19:11:00.430000", "db": "NVD", "id": "CVE-2021-22466" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2058" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014249" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2058" } ], "trust": 0.6 } }
var-202107-1678
Vulnerability from variot
There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1678", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "cve": "CVE-2021-22432", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2021-22432", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-380867", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-22432", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22432", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22432", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-22432", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202107-2227", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380867", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22432", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22432", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018743", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2227", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380867", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22432", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "id": "VAR-202107-1678", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380867" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:17:09.291000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172010" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22432" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22432/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380867" }, { "date": "2022-02-25T00:00:00", "db": "VULMON", "id": "CVE-2021-22432" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "date": "2022-02-25T19:15:10.007000", "db": "NVD", "id": "CVE-2021-22432" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380867" }, { "date": "2022-03-07T00:00:00", "db": "VULMON", "id": "CVE-2021-22432" }, { "date": "2023-07-06T01:42:00", "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "date": "2022-03-07T17:58:26.287000", "db": "NVD", "id": "CVE-2021-22432" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2227" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018743" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2227" } ], "trust": 0.6 } }
var-202209-0367
Vulnerability from variot
The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure. Huawei of EMUI , HarmonyOS , Magic UI Exists in a past traversal vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0367", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" } ] }, "cve": "CVE-2022-39001", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-39001", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39001", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-39001", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-39001", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-161", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "CNNVD", "id": "CNNVD-202209-161" }, { "db": "NVD", "id": "CVE-2022-39001" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure. Huawei of EMUI , HarmonyOS , Magic UI Exists in a past traversal vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39001", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017593", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-161", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434772", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39001", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "CNNVD", "id": "CNNVD-202209-161" }, { "db": "NVD", "id": "CVE-2022-39001" } ] }, "id": "VAR-202209-0367", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434772" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:00:47.137000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=208615" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39001" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39001/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "CNNVD", "id": "CNNVD-202209-161" }, { "db": "NVD", "id": "CVE-2022-39001" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "CNNVD", "id": "CNNVD-202209-161" }, { "db": "NVD", "id": "CVE-2022-39001" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434772" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39001" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-161" }, { "date": "2022-09-16T18:15:17.937000", "db": "NVD", "id": "CVE-2022-39001" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434772" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39001" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-161" }, { "date": "2022-09-21T12:30:08.660000", "db": "NVD", "id": "CVE-2022-39001" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-161" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Past traversal vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017593" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-161" } ], "trust": 0.6 } }
var-202210-0287
Vulnerability from variot
The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0287", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41581" } ] }, "cve": "CVE-2022-41581", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-41581", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41581", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-167", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-167" }, { "db": "NVD", "id": "CVE-2022-41581" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access", "sources": [ { "db": "NVD", "id": "CVE-2022-41581" }, { "db": "VULHUB", "id": "VHN-437811" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41581", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-167", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437811", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437811" }, { "db": "CNNVD", "id": "CNNVD-202210-167" }, { "db": "NVD", "id": "CVE-2022-41581" } ] }, "id": "VAR-202210-0287", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437811" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:32.376000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211149" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41581" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41581/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437811" }, { "db": "CNNVD", "id": "CNNVD-202210-167" }, { "db": "NVD", "id": "CVE-2022-41581" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437811" }, { "db": "CNNVD", "id": "CNNVD-202210-167" }, { "db": "NVD", "id": "CVE-2022-41581" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437811" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-167" }, { "date": "2022-10-14T16:15:22.013000", "db": "NVD", "id": "CVE-2022-41581" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437811" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-167" }, { "date": "2022-10-18T17:33:57.627000", "db": "NVD", "id": "CVE-2022-41581" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-167" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-167" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-167" } ], "trust": 0.6 } }
var-202108-0275
Vulnerability from variot
A component of the HarmonyOS has a permission bypass vulnerability. Local attackers may exploit this vulnerability to cause the device to hang due to the page error OsVmPageFaultHandler. HarmonyOS Is vulnerable to incorrect default permissions.Denial of service (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0275", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "NVD", "id": "CVE-2021-22295" } ] }, "cve": "CVE-2021-22295", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22295", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380730", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22295", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22295", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22295", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22295", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202108-655", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380730", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-22295", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380730" }, { "db": "VULMON", "id": "CVE-2021-22295" }, { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "CNNVD", "id": "CNNVD-202108-655" }, { "db": "NVD", "id": "CVE-2021-22295" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a permission bypass vulnerability. Local attackers may exploit this vulnerability to cause the device to hang due to the page error OsVmPageFaultHandler. HarmonyOS Is vulnerable to incorrect default permissions.Denial of service (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22295" }, { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "VULHUB", "id": "VHN-380730" }, { "db": "VULMON", "id": "CVE-2021-22295" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22295", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009621", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-655", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380730", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22295", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380730" }, { "db": "VULMON", "id": "CVE-2021-22295" }, { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "CNNVD", "id": "CNNVD-202108-655" }, { "db": "NVD", "id": "CVE-2021-22295" } ] }, "id": "VAR-202108-0275", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380730" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:46.743000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://device.harmonyos.com/" }, { "title": "HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=158952" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "CNNVD", "id": "CNNVD-202108-655" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380730" }, { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "NVD", "id": "CVE-2021-22295" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/cn/console/safetydetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pagesize=10\u0026pageindex=1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22295" }, { "trust": 0.1, "url": "https://device.harmonyos.com/cn/console/safetydetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026amp;pagesize=10\u0026amp;pageindex=1" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380730" }, { "db": "VULMON", "id": "CVE-2021-22295" }, { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "CNNVD", "id": "CNNVD-202108-655" }, { "db": "NVD", "id": "CVE-2021-22295" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380730" }, { "db": "VULMON", "id": "CVE-2021-22295" }, { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "CNNVD", "id": "CNNVD-202108-655" }, { "db": "NVD", "id": "CVE-2021-22295" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-06T00:00:00", "db": "VULHUB", "id": "VHN-380730" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22295" }, { "date": "2022-05-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "date": "2021-08-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-655" }, { "date": "2021-08-06T13:15:07.247000", "db": "NVD", "id": "CVE-2021-22295" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-13T00:00:00", "db": "VULHUB", "id": "VHN-380730" }, { "date": "2021-08-13T00:00:00", "db": "VULMON", "id": "CVE-2021-22295" }, { "date": "2022-05-13T08:37:00", "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-655" }, { "date": "2021-08-13T12:42:34.613000", "db": "NVD", "id": "CVE-2021-22295" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-655" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Inappropriate Default Permission Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009621" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-655" } ], "trust": 0.6 } }
var-202111-0884
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0884", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "NVD", "id": "CVE-2021-37003" } ] }, "cve": "CVE-2021-37003", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37003", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398834", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37003", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37003", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37003", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37003", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1873", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398834", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398834" }, { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "CNNVD", "id": "CNNVD-202111-1873" }, { "db": "NVD", "id": "CVE-2021-37003" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37003" }, { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "VULHUB", "id": "VHN-398834" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37003", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015634", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1873", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398834", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398834" }, { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "CNNVD", "id": "CNNVD-202111-1873" }, { "db": "NVD", "id": "CVE-2021-37003" } ] }, "id": "VAR-202111-0884", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398834" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:46.953000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172172" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "CNNVD", "id": "CNNVD-202111-1873" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398834" }, { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "NVD", "id": "CVE-2021-37003" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37003" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398834" }, { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "CNNVD", "id": "CNNVD-202111-1873" }, { "db": "NVD", "id": "CVE-2021-37003" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398834" }, { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "CNNVD", "id": "CNNVD-202111-1873" }, { "db": "NVD", "id": "CVE-2021-37003" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398834" }, { "date": "2022-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1873" }, { "date": "2021-11-23T16:15:08.807000", "db": "NVD", "id": "CVE-2021-37003" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398834" }, { "date": "2022-11-28T04:57:00", "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1873" }, { "date": "2021-11-29T16:05:26.050000", "db": "NVD", "id": "CVE-2021-37003" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1873" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015634" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1873" } ], "trust": 0.6 } }
var-202201-1719
Vulnerability from variot
There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1719", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" } ] }, "cve": "CVE-2021-40029", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40029", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401430", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40029", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40029", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40029", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40029", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202201-282", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401430", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "CNNVD", "id": "CNNVD-202201-282" }, { "db": "NVD", "id": "CVE-2021-40029" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "VULHUB", "id": "VHN-401430" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40029", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002897", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-282", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04995", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401430", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "CNNVD", "id": "CNNVD-202201-282" }, { "db": "NVD", "id": "CVE-2021-40029" } ] }, "id": "VAR-202201-1719", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401430" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:53.918000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177999" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40029" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "CNNVD", "id": "CNNVD-202201-282" }, { "db": "NVD", "id": "CVE-2021-40029" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "CNNVD", "id": "CNNVD-202201-282" }, { "db": "NVD", "id": "CVE-2021-40029" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401430" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-282" }, { "date": "2022-01-10T14:10:21.920000", "db": "NVD", "id": "CVE-2021-40029" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401430" }, { "date": "2023-01-25T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-282" }, { "date": "2022-01-13T14:34:52.030000", "db": "NVD", "id": "CVE-2021-40029" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-282" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002897" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-282" } ], "trust": 0.6 } }
var-202209-0453
Vulnerability from variot
The HW_KEYMASTER module lacks the validity check of the key format. Successful exploitation of this vulnerability may result in out-of-bounds memory access. Huawei of EMUI and HarmonyOS There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a buffer overflow vulnerability in HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0453", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "NVD", "id": "CVE-2021-40017" } ] }, "cve": "CVE-2021-40017", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40017", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40017", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40017", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-40017", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202209-168", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "CNNVD", "id": "CNNVD-202209-168" }, { "db": "NVD", "id": "CVE-2021-40017" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module lacks the validity check of the key format. Successful exploitation of this vulnerability may result in out-of-bounds memory access. Huawei of EMUI and HarmonyOS There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a buffer overflow vulnerability in HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2021-40017" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "VULHUB", "id": "VHN-401418" }, { "db": "VULMON", "id": "CVE-2021-40017" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40017", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-020317", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-168", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-64981", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401418", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40017", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401418" }, { "db": "VULMON", "id": "CVE-2021-40017" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "CNNVD", "id": "CNNVD-202209-168" }, { "db": "NVD", "id": "CVE-2021-40017" } ] }, "id": "VAR-202209-0453", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401418" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:43:43.509000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=208408" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401418" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "NVD", "id": "CVE-2021-40017" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40017" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40017/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401418" }, { "db": "VULMON", "id": "CVE-2021-40017" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "CNNVD", "id": "CNNVD-202209-168" }, { "db": "NVD", "id": "CVE-2021-40017" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401418" }, { "db": "VULMON", "id": "CVE-2021-40017" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "CNNVD", "id": "CNNVD-202209-168" }, { "db": "NVD", "id": "CVE-2021-40017" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-401418" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40017" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-168" }, { "date": "2022-09-16T18:15:11.457000", "db": "NVD", "id": "CVE-2021-40017" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-401418" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40017" }, { "date": "2023-10-11T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-168" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-40017" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-168" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020317" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-168" } ], "trust": 0.6 } }
var-202203-0261
Vulnerability from variot
There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is tampered with and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0261", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" } ] }, "cve": "CVE-2021-40053", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40053", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401454", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40053", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40053", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40053", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-40053", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202203-983", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401454", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "CNNVD", "id": "CNNVD-202203-983" }, { "db": "NVD", "id": "CVE-2021-40053" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is tampered with and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "VULHUB", "id": "VHN-401454" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40053", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018711", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-983", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401454", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "CNNVD", "id": "CNNVD-202203-983" }, { "db": "NVD", "id": "CVE-2021-40053" } ] }, "id": "VAR-202203-0261", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401454" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:41.641000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI and Huawei Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208071" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40053" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40053/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "CNNVD", "id": "CNNVD-202203-983" }, { "db": "NVD", "id": "CVE-2021-40053" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "CNNVD", "id": "CNNVD-202203-983" }, { "db": "NVD", "id": "CVE-2021-40053" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401454" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-983" }, { "date": "2022-03-10T17:43:19.430000", "db": "NVD", "id": "CVE-2021-40053" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-27T00:00:00", "db": "VULHUB", "id": "VHN-401454" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-983" }, { "date": "2022-10-27T18:47:20.967000", "db": "NVD", "id": "CVE-2021-40053" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-983" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018711" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-983" } ], "trust": 0.6 } }
var-202210-0291
Vulnerability from variot
The facial recognition module has a vulnerability in input validation.Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0291", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38985" } ] }, "cve": "CVE-2022-38985", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38985", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38985", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-146", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-146" }, { "db": "NVD", "id": "CVE-2022-38985" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The facial recognition module has a vulnerability in input validation.Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-38985" }, { "db": "VULHUB", "id": "VHN-434764" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38985", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-146", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434764", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434764" }, { "db": "CNNVD", "id": "CNNVD-202210-146" }, { "db": "NVD", "id": "CVE-2022-38985" } ] }, "id": "VAR-202210-0291", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434764" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:29.843000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211143" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434764" }, { "db": "NVD", "id": "CVE-2022-38985" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38985/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434764" }, { "db": "CNNVD", "id": "CNNVD-202210-146" }, { "db": "NVD", "id": "CVE-2022-38985" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434764" }, { "db": "CNNVD", "id": "CNNVD-202210-146" }, { "db": "NVD", "id": "CVE-2022-38985" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434764" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-146" }, { "date": "2022-10-14T16:15:15.777000", "db": "NVD", "id": "CVE-2022-38985" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434764" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-146" }, { "date": "2022-10-18T15:38:09.590000", "db": "NVD", "id": "CVE-2022-38985" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-146" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-146" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-146" } ], "trust": 0.6 } }
var-202209-0321
Vulnerability from variot
The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart. Huawei of EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0321", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" } ] }, "cve": "CVE-2022-39006", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "id": "CVE-2022-39006", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-39006", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-39006", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-39006", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202209-202", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "CNNVD", "id": "CNNVD-202209-202" }, { "db": "NVD", "id": "CVE-2022-39006" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart. Huawei of EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39006", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017588", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-202", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-64986", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428494", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39006", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "CNNVD", "id": "CNNVD-202209-202" }, { "db": "NVD", "id": "CVE-2022-39006" } ] }, "id": "VAR-202209-0321", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428494" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:37:19.477000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=208617" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39006" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39006/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "CNNVD", "id": "CNNVD-202209-202" }, { "db": "NVD", "id": "CVE-2022-39006" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "CNNVD", "id": "CNNVD-202209-202" }, { "db": "NVD", "id": "CVE-2022-39006" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428494" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39006" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-202" }, { "date": "2022-09-16T18:15:18.133000", "db": "NVD", "id": "CVE-2022-39006" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428494" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39006" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-202" }, { "date": "2022-09-21T12:55:11.720000", "db": "NVD", "id": "CVE-2022-39006" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-202" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product race condition vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017588" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-202" } ], "trust": 0.6 } }
var-202203-0972
Vulnerability from variot
There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0972", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" } ] }, "cve": "CVE-2021-40050", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2021-40050", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-401451", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40050", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40050", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40050", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-40050", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202203-986", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401451", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "CNNVD", "id": "CNNVD-202203-986" }, { "db": "NVD", "id": "CVE-2021-40050" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "VULHUB", "id": "VHN-401451" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40050", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018714", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-986", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401451", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "CNNVD", "id": "CNNVD-202203-986" }, { "db": "NVD", "id": "CVE-2021-40050" } ] }, "id": "VAR-202203-0972", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401451" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:55:35.265000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=186013" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40050" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40050/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "CNNVD", "id": "CNNVD-202203-986" }, { "db": "NVD", "id": "CVE-2021-40050" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "CNNVD", "id": "CNNVD-202203-986" }, { "db": "NVD", "id": "CVE-2021-40050" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401451" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-986" }, { "date": "2022-03-10T17:43:17.980000", "db": "NVD", "id": "CVE-2021-40050" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401451" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-986" }, { "date": "2022-03-14T15:40:09.787000", "db": "NVD", "id": "CVE-2021-40050" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-986" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018714" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-986" } ], "trust": 0.6 } }
var-202108-0283
Vulnerability from variot
A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to cause persistent dos. HarmonyOS Exists in an inadequate validation of data reliability vulnerabilities.Denial of service (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0283", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "NVD", "id": "CVE-2021-22419" } ] }, "cve": "CVE-2021-22419", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22419", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380854", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22419", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22419", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22419", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22419", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202108-316", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380854", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22419", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380854" }, { "db": "VULMON", "id": "CVE-2021-22419" }, { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "CNNVD", "id": "CNNVD-202108-316" }, { "db": "NVD", "id": "CVE-2021-22419" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to cause persistent dos. HarmonyOS Exists in an inadequate validation of data reliability vulnerabilities.Denial of service (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22419" }, { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "VULHUB", "id": "VHN-380854" }, { "db": "VULMON", "id": "CVE-2021-22419" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22419", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009371", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-316", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380854", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22419", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380854" }, { "db": "VULMON", "id": "CVE-2021-22419" }, { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "CNNVD", "id": "CNNVD-202108-316" }, { "db": "NVD", "id": "CVE-2021-22419" } ] }, "id": "VAR-202108-0283", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380854" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:50:12.796000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Repair measures for data forgery problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=159647" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "CNNVD", "id": "CNNVD-202108-316" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-345", "trust": 1.1 }, { "problemtype": "Inadequate verification of data reliability (CWE-345) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380854" }, { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "NVD", "id": "CVE-2021-22419" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22419" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/345.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380854" }, { "db": "VULMON", "id": "CVE-2021-22419" }, { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "CNNVD", "id": "CNNVD-202108-316" }, { "db": "NVD", "id": "CVE-2021-22419" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380854" }, { "db": "VULMON", "id": "CVE-2021-22419" }, { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "CNNVD", "id": "CNNVD-202108-316" }, { "db": "NVD", "id": "CVE-2021-22419" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380854" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22419" }, { "date": "2022-04-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-316" }, { "date": "2021-08-03T18:15:08.090000", "db": "NVD", "id": "CVE-2021-22419" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-380854" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22419" }, { "date": "2022-04-21T08:58:00", "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-316" }, { "date": "2021-08-11T13:29:31.587000", "db": "NVD", "id": "CVE-2021-22419" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-316" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability for inadequate validation of data reliability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009371" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-316" } ], "trust": 0.6 } }
var-202111-0853
Vulnerability from variot
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the fact that the program does not check the message
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0853", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "NVD", "id": "CVE-2021-37007" } ] }, "cve": "CVE-2021-37007", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37007", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398838", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37007", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37007", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37007", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37007", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1876", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398838", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398838" }, { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "CNNVD", "id": "CNNVD-202111-1876" }, { "db": "NVD", "id": "CVE-2021-37007" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the fact that the program does not check the message", "sources": [ { "db": "NVD", "id": "CVE-2021-37007" }, { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "VULHUB", "id": "VHN-398838" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37007", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015638", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1876", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102856", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398838", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398838" }, { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "CNNVD", "id": "CNNVD-202111-1876" }, { "db": "NVD", "id": "CVE-2021-37007" } ] }, "id": "VAR-202111-0853", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398838" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:50:04.354000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172175" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "CNNVD", "id": "CNNVD-202111-1876" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398838" }, { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "NVD", "id": "CVE-2021-37007" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37007" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398838" }, { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "CNNVD", "id": "CNNVD-202111-1876" }, { "db": "NVD", "id": "CVE-2021-37007" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398838" }, { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "CNNVD", "id": "CNNVD-202111-1876" }, { "db": "NVD", "id": "CVE-2021-37007" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398838" }, { "date": "2022-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1876" }, { "date": "2021-11-23T16:15:08.980000", "db": "NVD", "id": "CVE-2021-37007" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398838" }, { "date": "2022-11-28T05:15:00", "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1876" }, { "date": "2021-11-29T15:34:37.520000", "db": "NVD", "id": "CVE-2021-37007" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1876" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015638" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1876" } ], "trust": 0.6 } }
var-202210-0251
Vulnerability from variot
The DFX unwind stack module of the ArkCompiler has a vulnerability in interface calling.Successful exploitation of this vulnerability affects system services and device availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0251", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41589" } ] }, "cve": "CVE-2022-41589", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-41589", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41589", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-166", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-166" }, { "db": "NVD", "id": "CVE-2022-41589" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX unwind stack module of the ArkCompiler has a vulnerability in interface calling.Successful exploitation of this vulnerability affects system services and device availability", "sources": [ { "db": "NVD", "id": "CVE-2022-41589" }, { "db": "VULHUB", "id": "VHN-437822" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41589", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-166", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437822", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437822" }, { "db": "CNNVD", "id": "CNNVD-202210-166" }, { "db": "NVD", "id": "CVE-2022-41589" } ] }, "id": "VAR-202210-0251", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437822" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:14.571000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211148" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41589" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41589/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437822" }, { "db": "CNNVD", "id": "CNNVD-202210-166" }, { "db": "NVD", "id": "CVE-2022-41589" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437822" }, { "db": "CNNVD", "id": "CNNVD-202210-166" }, { "db": "NVD", "id": "CVE-2022-41589" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437822" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-166" }, { "date": "2022-10-14T16:15:25.717000", "db": "NVD", "id": "CVE-2022-41589" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437822" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-166" }, { "date": "2022-10-18T17:10:49.960000", "db": "NVD", "id": "CVE-2022-41589" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-166" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-166" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-166" } ], "trust": 0.6 } }
var-202212-0527
Vulnerability from variot
The ProfileSDK has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0527", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "db": "NVD", "id": "CVE-2022-46315" } ] }, "cve": "CVE-2022-46315", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-46315", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46315", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46315", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-46315", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202212-2489", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "db": "CNNVD", "id": "CNNVD-202212-2489" }, { "db": "NVD", "id": "CVE-2022-46315" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The ProfileSDK has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46315" }, { "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "db": "VULHUB", "id": "VHN-444285" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46315", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023888", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2489", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444285", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444285" }, { "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "db": "CNNVD", "id": "CNNVD-202212-2489" }, { "db": "NVD", "id": "CVE-2022-46315" } ] }, "id": "VAR-202212-0527", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444285" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:10.984000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218947" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2489" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "db": "NVD", "id": "CVE-2022-46315" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 2.4, "url": "https://consumer.huawei.com/en/support/bulletin/2023/3" }, { "trust": 2.4, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46315" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202303-0000001529824505" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46315/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444285" }, { "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "db": "CNNVD", "id": "CNNVD-202212-2489" }, { "db": "NVD", "id": "CVE-2022-46315" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444285" }, { "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "db": "CNNVD", "id": "CNNVD-202212-2489" }, { "db": "NVD", "id": "CVE-2022-46315" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444285" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2489" }, { "date": "2022-12-20T21:15:11.397000", "db": "NVD", "id": "CVE-2022-46315" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444285" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "date": "2023-03-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2489" }, { "date": "2023-11-07T03:55:33.690000", "db": "NVD", "id": "CVE-2022-46315" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2489" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023888" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2489" } ], "trust": 0.6 } }
var-202111-0847
Vulnerability from variot
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0847", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "NVD", "id": "CVE-2021-37015" } ] }, "cve": "CVE-2021-37015", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37015", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398847", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37015", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37015", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37015", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37015", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1883", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398847", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398847" }, { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "CNNVD", "id": "CNNVD-202111-1883" }, { "db": "NVD", "id": "CVE-2021-37015" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37015" }, { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "VULHUB", "id": "VHN-398847" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37015", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015584", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1883", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398847", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398847" }, { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "CNNVD", "id": "CNNVD-202111-1883" }, { "db": "NVD", "id": "CVE-2021-37015" } ] }, "id": "VAR-202111-0847", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398847" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:18:14.780000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172182" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "CNNVD", "id": "CNNVD-202111-1883" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398847" }, { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "NVD", "id": "CVE-2021-37015" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37015" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398847" }, { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "CNNVD", "id": "CNNVD-202111-1883" }, { "db": "NVD", "id": "CVE-2021-37015" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398847" }, { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "CNNVD", "id": "CNNVD-202111-1883" }, { "db": "NVD", "id": "CVE-2021-37015" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398847" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1883" }, { "date": "2021-11-23T16:15:09.240000", "db": "NVD", "id": "CVE-2021-37015" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398847" }, { "date": "2022-11-24T09:03:00", "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1883" }, { "date": "2021-11-29T15:21:49.657000", "db": "NVD", "id": "CVE-2021-37015" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1883" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015584" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1883" } ], "trust": 0.6 } }
var-202203-0269
Vulnerability from variot
There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0269", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" } ] }, "cve": "CVE-2021-40063", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40063", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401464", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40063", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40063", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40063", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40063", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202203-972", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401464", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "CNNVD", "id": "CNNVD-202203-972" }, { "db": "NVD", "id": "CVE-2021-40063" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "VULHUB", "id": "VHN-401464" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40063", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018701", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-972", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401464", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "CNNVD", "id": "CNNVD-202203-972" }, { "db": "NVD", "id": "CVE-2021-40063" } ] }, "id": "VAR-202203-0269", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401464" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:52.069000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=185886" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40063" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40063/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "CNNVD", "id": "CNNVD-202203-972" }, { "db": "NVD", "id": "CVE-2021-40063" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "CNNVD", "id": "CNNVD-202203-972" }, { "db": "NVD", "id": "CVE-2021-40063" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401464" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-972" }, { "date": "2022-03-10T17:43:24.527000", "db": "NVD", "id": "CVE-2021-40063" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401464" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-972" }, { "date": "2022-03-14T16:17:53.347000", "db": "NVD", "id": "CVE-2021-40063" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-972" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018701" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-972" } ], "trust": 0.6 } }
var-202110-1865
Vulnerability from variot
Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause the directory is traversed. HarmonyOS Exists in a past traversal vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. The vulnerability is due to a vulnerability in a component of HarmonyOS that is not strict enough for uri verification. Attackers can exploit this vulnerability to cause directory attack traversal, affecting confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1865", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "NVD", "id": "CVE-2021-37126" } ] }, "cve": "CVE-2021-37126", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37126", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398963", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37126", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37126", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37126", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37126", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2216", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398963", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398963" }, { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "CNNVD", "id": "CNNVD-202110-2216" }, { "db": "NVD", "id": "CVE-2021-37126" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause the directory is traversed. HarmonyOS Exists in a past traversal vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. The vulnerability is due to a vulnerability in a component of HarmonyOS that is not strict enough for uri verification. Attackers can exploit this vulnerability to cause directory attack traversal, affecting confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37126" }, { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "VULHUB", "id": "VHN-398963" }, { "db": "VULMON", "id": "CVE-2021-37126" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37126", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017298", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2216", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-04708", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398963", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37126", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398963" }, { "db": "VULMON", "id": "CVE-2021-37126" }, { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "CNNVD", "id": "CNNVD-202110-2216" }, { "db": "NVD", "id": "CVE-2021-37126" } ] }, "id": "VAR-202110-1865", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398963" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:32.122000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176764" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "CNNVD", "id": "CNNVD-202110-2216" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398963" }, { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "NVD", "id": "CVE-2021-37126" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37126" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398963" }, { "db": "VULMON", "id": "CVE-2021-37126" }, { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "CNNVD", "id": "CNNVD-202110-2216" }, { "db": "NVD", "id": "CVE-2021-37126" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398963" }, { "db": "VULMON", "id": "CVE-2021-37126" }, { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "CNNVD", "id": "CNNVD-202110-2216" }, { "db": "NVD", "id": "CVE-2021-37126" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398963" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37126" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2216" }, { "date": "2022-01-03T22:15:09.643000", "db": "NVD", "id": "CVE-2021-37126" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398963" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37126" }, { "date": "2023-01-13T05:53:00", "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2216" }, { "date": "2022-01-11T20:04:44.400000", "db": "NVD", "id": "CVE-2021-37126" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2216" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017298" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2216" } ], "trust": 0.6 } }
var-202110-1460
Vulnerability from variot
A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1460", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "NVD", "id": "CVE-2021-22451" } ] }, "cve": "CVE-2021-22451", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-22451", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380886", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22451", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22451", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22451", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22451", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2041", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380886", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380886" }, { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "CNNVD", "id": "CNNVD-202110-2041" }, { "db": "NVD", "id": "CVE-2021-22451" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22451" }, { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "VULHUB", "id": "VHN-380886" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22451", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014241", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2041", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380886", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380886" }, { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "CNNVD", "id": "CNNVD-202110-2041" }, { "db": "NVD", "id": "CVE-2021-22451" } ] }, "id": "VAR-202110-1460", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380886" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:37:51.008000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=168086" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "CNNVD", "id": "CNNVD-202110-2041" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380886" }, { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "NVD", "id": "CVE-2021-22451" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22451" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380886" }, { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "CNNVD", "id": "CNNVD-202110-2041" }, { "db": "NVD", "id": "CVE-2021-22451" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380886" }, { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "CNNVD", "id": "CNNVD-202110-2041" }, { "db": "NVD", "id": "CVE-2021-22451" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380886" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2041" }, { "date": "2021-10-28T13:15:08.860000", "db": "NVD", "id": "CVE-2021-22451" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380886" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2041" }, { "date": "2021-11-01T18:56:05.770000", "db": "NVD", "id": "CVE-2021-22451" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2041" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014241" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2041" } ], "trust": 0.6 } }
var-202302-0414
Vulnerability from variot
The IHwAttestationService interface has a defect in authentication. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is an authentication vulnerability in.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0414", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "NVD", "id": "CVE-2022-48294" } ] }, "cve": "CVE-2022-48294", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-48294", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48294", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48294", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-48294", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202302-353", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "CNNVD", "id": "CNNVD-202302-353" }, { "db": "NVD", "id": "CVE-2022-48294" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The IHwAttestationService interface has a defect in authentication. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is an authentication vulnerability in.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48294" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "VULHUB", "id": "VHN-453374" }, { "db": "VULMON", "id": "CVE-2022-48294" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48294", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003620", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-353", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453374", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48294", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453374" }, { "db": "VULMON", "id": "CVE-2022-48294" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "CNNVD", "id": "CNNVD-202302-353" }, { "db": "NVD", "id": "CVE-2022-48294" } ] }, "id": "VAR-202302-0414", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453374" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:19.672000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225930" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453374" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "NVD", "id": "CVE-2022-48294" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48294" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48294/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453374" }, { "db": "VULMON", "id": "CVE-2022-48294" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "CNNVD", "id": "CNNVD-202302-353" }, { "db": "NVD", "id": "CVE-2022-48294" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453374" }, { "db": "VULMON", "id": "CVE-2022-48294" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "CNNVD", "id": "CNNVD-202302-353" }, { "db": "NVD", "id": "CVE-2022-48294" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453374" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48294" }, { "date": "2023-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-353" }, { "date": "2023-02-09T17:15:13.837000", "db": "NVD", "id": "CVE-2022-48294" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-17T00:00:00", "db": "VULHUB", "id": "VHN-453374" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48294" }, { "date": "2023-09-14T07:47:00", "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "date": "2023-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-353" }, { "date": "2023-02-17T14:17:12.003000", "db": "NVD", "id": "CVE-2022-48294" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-353" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003620" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-353" } ], "trust": 0.6 } }
var-202206-0120
Vulnerability from variot
The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0120", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" } ] }, "cve": "CVE-2022-31757", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-31757", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-423590", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-31757", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31757", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-31757", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-31757", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202206-470", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423590", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "CNNVD", "id": "CNNVD-202206-470" }, { "db": "NVD", "id": "CVE-2022-31757" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31757", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012034", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-470", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66174", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423590", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31757", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "CNNVD", "id": "CNNVD-202206-470" }, { "db": "NVD", "id": "CVE-2022-31757" } ] }, "id": "VAR-202206-0120", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423590" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:48.491000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=198078" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31757" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31757/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "CNNVD", "id": "CNNVD-202206-470" }, { "db": "NVD", "id": "CVE-2022-31757" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "CNNVD", "id": "CNNVD-202206-470" }, { "db": "NVD", "id": "CVE-2022-31757" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423590" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31757" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-470" }, { "date": "2022-06-13T16:15:08.723000", "db": "NVD", "id": "CVE-2022-31757" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423590" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31757" }, { "date": "2023-08-25T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-470" }, { "date": "2022-06-27T16:14:54.070000", "db": "NVD", "id": "CVE-2022-31757" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-470" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012034" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-470" } ], "trust": 0.6 } }
var-202209-0140
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0140", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" } ] }, "cve": "CVE-2022-38988", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38988", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38988", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38988", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-38988", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-193", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "CNNVD", "id": "CNNVD-202209-193" }, { "db": "NVD", "id": "CVE-2022-38988" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "VULHUB", "id": "VHN-428500" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38988", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016791", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-193", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428500", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428500" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "CNNVD", "id": "CNNVD-202209-193" }, { "db": "NVD", "id": "CVE-2022-38988" } ] }, "id": "VAR-202209-0140", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428500" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:43:43.746000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208089" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38988" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38988/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428500" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "CNNVD", "id": "CNNVD-202209-193" }, { "db": "NVD", "id": "CVE-2022-38988" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428500" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "CNNVD", "id": "CNNVD-202209-193" }, { "db": "NVD", "id": "CVE-2022-38988" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428500" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-193" }, { "date": "2022-09-16T18:15:17.477000", "db": "NVD", "id": "CVE-2022-38988" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428500" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-193" }, { "date": "2022-09-17T03:46:28.717000", "db": "NVD", "id": "CVE-2022-38988" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-193" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-193" } ], "trust": 0.6 } }
var-202110-1449
Vulnerability from variot
A component of the HarmonyOS has a Privileges Controls vulnerability. Local attackers may exploit this vulnerability to expand the Recording Trusted Domain. HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1449", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "NVD", "id": "CVE-2021-22470" } ] }, "cve": "CVE-2021-22470", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-22470", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380905", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22470", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22470", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22470", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22470", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2064", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380905", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380905" }, { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "CNNVD", "id": "CNNVD-202110-2064" }, { "db": "NVD", "id": "CVE-2021-22470" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Privileges Controls vulnerability. Local attackers may exploit this vulnerability to expand the Recording Trusted Domain. HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22470" }, { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "VULHUB", "id": "VHN-380905" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22470", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014253", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2064", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380905", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380905" }, { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "CNNVD", "id": "CNNVD-202110-2064" }, { "db": "NVD", "id": "CVE-2021-22470" } ] }, "id": "VAR-202110-1449", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380905" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:55:46.541000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171539" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "CNNVD", "id": "CNNVD-202110-2064" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380905" }, { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "NVD", "id": "CVE-2021-22470" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22470" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380905" }, { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "CNNVD", "id": "CNNVD-202110-2064" }, { "db": "NVD", "id": "CVE-2021-22470" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380905" }, { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "CNNVD", "id": "CNNVD-202110-2064" }, { "db": "NVD", "id": "CVE-2021-22470" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380905" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2064" }, { "date": "2021-10-28T13:15:09.663000", "db": "NVD", "id": "CVE-2021-22470" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380905" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2064" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22470" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2064" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014253" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2064" } ], "trust": 0.6 } }
var-202110-1456
Vulnerability from variot
A component of the HarmonyOS has a Use After Free vulnerability . Local attackers may exploit this vulnerability to cause Kernel Information disclosure
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1456", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "NVD", "id": "CVE-2021-22463" } ] }, "cve": "CVE-2021-22463", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-22463", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380898", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22463", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22463", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22463", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22463", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2055", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380898", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380898" }, { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "CNNVD", "id": "CNNVD-202110-2055" }, { "db": "NVD", "id": "CVE-2021-22463" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Use After Free vulnerability . Local attackers may exploit this vulnerability to cause Kernel Information disclosure", "sources": [ { "db": "NVD", "id": "CVE-2021-22463" }, { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "VULHUB", "id": "VHN-380898" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22463", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014246", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2055", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380898", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380898" }, { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "CNNVD", "id": "CNNVD-202110-2055" }, { "db": "NVD", "id": "CVE-2021-22463" } ] }, "id": "VAR-202110-1456", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380898" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:52.139000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=168202" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "CNNVD", "id": "CNNVD-202110-2055" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380898" }, { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "NVD", "id": "CVE-2021-22463" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22463" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380898" }, { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "CNNVD", "id": "CNNVD-202110-2055" }, { "db": "NVD", "id": "CVE-2021-22463" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380898" }, { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "CNNVD", "id": "CNNVD-202110-2055" }, { "db": "NVD", "id": "CVE-2021-22463" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380898" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2055" }, { "date": "2021-10-28T13:15:09.357000", "db": "NVD", "id": "CVE-2021-22463" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380898" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2055" }, { "date": "2021-11-01T19:18:32.543000", "db": "NVD", "id": "CVE-2021-22463" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2055" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014246" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2055" } ], "trust": 0.6 } }
var-202108-0282
Vulnerability from variot
A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0282", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "NVD", "id": "CVE-2021-22418" } ] }, "cve": "CVE-2021-22418", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2021-22418", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380853", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22418", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22418", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22418", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22418", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202108-324", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380853", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22418", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380853" }, { "db": "VULMON", "id": "CVE-2021-22418" }, { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "CNNVD", "id": "CNNVD-202108-324" }, { "db": "NVD", "id": "CVE-2021-22418" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22418" }, { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "VULHUB", "id": "VHN-380853" }, { "db": "VULMON", "id": "CVE-2021-22418" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22418", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009372", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-324", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380853", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22418", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380853" }, { "db": "VULMON", "id": "CVE-2021-22418" }, { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "CNNVD", "id": "CNNVD-202108-324" }, { "db": "NVD", "id": "CVE-2021-22418" } ] }, "id": "VAR-202108-0282", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380853" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:25:16.490000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=159653" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "CNNVD", "id": "CNNVD-202108-324" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380853" }, { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "NVD", "id": "CVE-2021-22418" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22418" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/190.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380853" }, { "db": "VULMON", "id": "CVE-2021-22418" }, { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "CNNVD", "id": "CNNVD-202108-324" }, { "db": "NVD", "id": "CVE-2021-22418" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380853" }, { "db": "VULMON", "id": "CVE-2021-22418" }, { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "CNNVD", "id": "CNNVD-202108-324" }, { "db": "NVD", "id": "CVE-2021-22418" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380853" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22418" }, { "date": "2022-04-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-324" }, { "date": "2021-08-03T18:15:08.050000", "db": "NVD", "id": "CVE-2021-22418" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-380853" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22418" }, { "date": "2022-04-21T09:02:00", "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-324" }, { "date": "2021-08-11T13:25:01.420000", "db": "NVD", "id": "CVE-2021-22418" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-324" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009372" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-324" } ], "trust": 0.6 } }
var-202211-0461
Vulnerability from variot
Missing parameter type validation in the DRM module. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and HarmonyOS There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0461", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "NVD", "id": "CVE-2022-44556" } ] }, "cve": "CVE-2022-44556", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-44556", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44556", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44556", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-44556", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202211-2335", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "CNNVD", "id": "CNNVD-202211-2335" }, { "db": "NVD", "id": "CVE-2022-44556" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Missing parameter type validation in the DRM module. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and HarmonyOS There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44556" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "VULHUB", "id": "VHN-441944" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44556", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020502", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2335", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441944", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441944" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "CNNVD", "id": "CNNVD-202211-2335" }, { "db": "NVD", "id": "CVE-2022-44556" } ] }, "id": "VAR-202211-0461", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441944" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:27.826000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213747" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441944" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "NVD", "id": "CVE-2022-44556" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44556" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44556/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441944" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "CNNVD", "id": "CNNVD-202211-2335" }, { "db": "NVD", "id": "CVE-2022-44556" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441944" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "CNNVD", "id": "CNNVD-202211-2335" }, { "db": "NVD", "id": "CVE-2022-44556" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-08T00:00:00", "db": "VULHUB", "id": "VHN-441944" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "date": "2022-11-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2335" }, { "date": "2022-11-08T18:15:11.483000", "db": "NVD", "id": "CVE-2022-44556" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-03T00:00:00", "db": "VULHUB", "id": "VHN-441944" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "date": "2022-12-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2335" }, { "date": "2023-11-07T03:54:19.583000", "db": "NVD", "id": "CVE-2022-44556" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2335" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020502" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2335" } ], "trust": 0.6 } }
var-202110-1434
Vulnerability from variot
A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1434", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "NVD", "id": "CVE-2021-22456" } ] }, "cve": "CVE-2021-22456", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22456", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380891", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22456", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22456", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22456", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22456", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2046", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380891", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380891" }, { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "CNNVD", "id": "CNNVD-202110-2046" }, { "db": "NVD", "id": "CVE-2021-22456" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22456" }, { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "VULHUB", "id": "VHN-380891" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22456", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014463", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2046", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380891", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380891" }, { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "CNNVD", "id": "CNNVD-202110-2046" }, { "db": "NVD", "id": "CVE-2021-22456" } ] }, "id": "VAR-202110-1434", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380891" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:25:09.196000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171483" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "CNNVD", "id": "CNNVD-202110-2046" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "NVD", "id": "CVE-2021-22456" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22456" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380891" }, { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "CNNVD", "id": "CNNVD-202110-2046" }, { "db": "NVD", "id": "CVE-2021-22456" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380891" }, { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "CNNVD", "id": "CNNVD-202110-2046" }, { "db": "NVD", "id": "CVE-2021-22456" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380891" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2046" }, { "date": "2021-10-28T13:15:09.067000", "db": "NVD", "id": "CVE-2021-22456" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380891" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2046" }, { "date": "2021-11-02T13:55:34.167000", "db": "NVD", "id": "CVE-2021-22456" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2046" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014463" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2046" } ], "trust": 0.6 } }
var-202112-0943
Vulnerability from variot
There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei.
A security vulnerability exists in the Huawei HarmonyOS HwConnectivityExService service. Huawei HarmonyOS is an operating system. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0943", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" } ] }, "cve": "CVE-2021-39998", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-39998", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-05169", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401399", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-39998", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39998", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39998", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39998", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2022-05169", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-215", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401399", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "CNNVD", "id": "CNNVD-202112-215" }, { "db": "NVD", "id": "CVE-2021-39998" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei. \n\r\n\r\nA security vulnerability exists in the Huawei HarmonyOS HwConnectivityExService service. Huawei HarmonyOS is an operating system. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39998", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017518", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05169", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-215", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401399", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "CNNVD", "id": "CNNVD-202112-215" }, { "db": "NVD", "id": "CVE-2021-39998" } ] }, "id": "VAR-202112-0943", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" } ] }, "last_update_date": "2024-08-14T14:44:12.121000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Unknown vulnerability exists in Huawei HarmonyOS HwConnectivityExService service", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/315101" }, { "title": "Huawei HarmonyOS and Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172739" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39998" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "CNNVD", "id": "CNNVD-202112-215" }, { "db": "NVD", "id": "CVE-2021-39998" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "CNNVD", "id": "CNNVD-202112-215" }, { "db": "NVD", "id": "CVE-2021-39998" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05169" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401399" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-215" }, { "date": "2022-01-10T14:10:20.877000", "db": "NVD", "id": "CVE-2021-39998" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05169" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401399" }, { "date": "2023-01-24T05:49:00", "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-215" }, { "date": "2022-01-13T02:10:20.940000", "db": "NVD", "id": "CVE-2021-39998" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-215" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017518" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-215" } ], "trust": 0.6 } }
var-202109-1957
Vulnerability from variot
The interface of a certain HarmonyOS module has an invalid address access vulnerability. Successful exploitation of this vulnerability may lead to kernel crash. HarmonyOS The module contains a buffer error vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1957", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "NVD", "id": "CVE-2021-22479" } ] }, "cve": "CVE-2021-22479", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22479", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380914", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22479", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22479", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22479", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22479", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202109-2056", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380914", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380914" }, { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "CNNVD", "id": "CNNVD-202109-2056" }, { "db": "NVD", "id": "CVE-2021-22479" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The interface of a certain HarmonyOS module has an invalid address access vulnerability. Successful exploitation of this vulnerability may lead to kernel crash. HarmonyOS The module contains a buffer error vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22479" }, { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "VULHUB", "id": "VHN-380914" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22479", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018623", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2056", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380914", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380914" }, { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "CNNVD", "id": "CNNVD-202109-2056" }, { "db": "NVD", "id": "CVE-2021-22479" } ] }, "id": "VAR-202109-1957", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380914" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:42:44.576000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171924" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "CNNVD", "id": "CNNVD-202109-2056" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380914" }, { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "NVD", "id": "CVE-2021-22479" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22479" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22479/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380914" }, { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "CNNVD", "id": "CNNVD-202109-2056" }, { "db": "NVD", "id": "CVE-2021-22479" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380914" }, { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "CNNVD", "id": "CNNVD-202109-2056" }, { "db": "NVD", "id": "CVE-2021-22479" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380914" }, { "date": "2023-07-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2056" }, { "date": "2022-02-25T19:15:11.063000", "db": "NVD", "id": "CVE-2021-22479" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380914" }, { "date": "2023-07-04T01:53:00", "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2056" }, { "date": "2022-03-07T19:12:47.297000", "db": "NVD", "id": "CVE-2021-22479" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2056" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Buffer error vulnerability in module", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018623" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2056" } ], "trust": 0.6 } }
var-202112-0249
Vulnerability from variot
There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality or Availability impacted. Huawei Smartphones contain an integer overflow vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from incorrect input validation in the kernel module of HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0249", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "NVD", "id": "CVE-2021-37065" } ] }, "cve": "CVE-2021-37065", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37065", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398899", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37065", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37065", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37065", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37065", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2037", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398899", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398899" }, { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "CNNVD", "id": "CNNVD-202109-2037" }, { "db": "NVD", "id": "CVE-2021-37065" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality or Availability impacted. Huawei Smartphones contain an integer overflow vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from incorrect input validation in the kernel module of HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-37065" }, { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "VULHUB", "id": "VHN-398899" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37065", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016032", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2037", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44616", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398899", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398899" }, { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "CNNVD", "id": "CNNVD-202109-2037" }, { "db": "NVD", "id": "CVE-2021-37065" } ] }, "id": "VAR-202112-0249", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398899" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:44.736000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173514" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "CNNVD", "id": "CNNVD-202109-2037" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398899" }, { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "NVD", "id": "CVE-2021-37065" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37065" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398899" }, { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "CNNVD", "id": "CNNVD-202109-2037" }, { "db": "NVD", "id": "CVE-2021-37065" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398899" }, { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "CNNVD", "id": "CNNVD-202109-2037" }, { "db": "NVD", "id": "CVE-2021-37065" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398899" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2037" }, { "date": "2021-12-07T17:15:08.800000", "db": "NVD", "id": "CVE-2021-37065" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398899" }, { "date": "2022-12-05T07:11:00", "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2037" }, { "date": "2021-12-09T17:39:41.403000", "db": "NVD", "id": "CVE-2021-37065" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2037" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Integer overflow vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016032" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2037" } ], "trust": 0.6 } }
var-202210-1039
Vulnerability from variot
The HIPP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause out-of-bounds access to the HIPP module and page table tampering, affecting device confidentiality and availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-1039", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38986" } ] }, "cve": "CVE-2022-38986", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38986", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38986", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-954", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-954" }, { "db": "NVD", "id": "CVE-2022-38986" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HIPP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause out-of-bounds access to the HIPP module and page table tampering, affecting device confidentiality and availability", "sources": [ { "db": "NVD", "id": "CVE-2022-38986" }, { "db": "VULHUB", "id": "VHN-434765" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38986", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-954", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434765", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434765" }, { "db": "CNNVD", "id": "CNNVD-202210-954" }, { "db": "NVD", "id": "CVE-2022-38986" } ] }, "id": "VAR-202210-1039", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434765" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:55:10.402000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211185" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38986" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38986/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434765" }, { "db": "CNNVD", "id": "CNNVD-202210-954" }, { "db": "NVD", "id": "CVE-2022-38986" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434765" }, { "db": "CNNVD", "id": "CNNVD-202210-954" }, { "db": "NVD", "id": "CVE-2022-38986" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434765" }, { "date": "2022-10-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-954" }, { "date": "2022-10-14T16:15:16.187000", "db": "NVD", "id": "CVE-2022-38986" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434765" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-954" }, { "date": "2022-10-18T15:43:11.597000", "db": "NVD", "id": "CVE-2022-38986" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-954" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei EMUI Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-954" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-954" } ], "trust": 0.6 } }
var-202205-0114
Vulnerability from variot
The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash. Huawei of EMUI , Magic UI , HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0114", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" } ] }, "cve": "CVE-2021-46787", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-46787", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-419299", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-46787", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46787", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46787", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-46787", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202205-2555", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-419299", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" }, { "db": "NVD", "id": "CVE-2021-46787" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash. Huawei of EMUI , Magic UI , HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46787", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009693", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2555", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-419299", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46787", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" }, { "db": "NVD", "id": "CVE-2021-46787" } ] }, "id": "VAR-202205-0114", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419299" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:46.535000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193776" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46787" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46787/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" }, { "db": "NVD", "id": "CVE-2021-46787" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" }, { "db": "NVD", "id": "CVE-2021-46787" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419299" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46787" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2555" }, { "date": "2022-05-13T15:15:08.523000", "db": "NVD", "id": "CVE-2021-46787" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-419299" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46787" }, { "date": "2023-08-07T08:16:00", "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2555" }, { "date": "2022-05-23T18:47:27.837000", "db": "NVD", "id": "CVE-2021-46787" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2555" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009693" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2555" } ], "trust": 0.6 } }
var-202205-0341
Vulnerability from variot
The graphics acceleration service has a vulnerability in multi-thread access to the database.Successful exploitation of this vulnerability may cause service exceptions. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0341", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "NVD", "id": "CVE-2022-29790" } ] }, "cve": "CVE-2022-29790", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-29790", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421299", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-29790", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29790", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29790", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-29790", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202205-2549", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421299", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-29790", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "CNNVD", "id": "CNNVD-202205-2549" }, { "db": "NVD", "id": "CVE-2022-29790" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The graphics acceleration service has a vulnerability in multi-thread access to the database.Successful exploitation of this vulnerability may cause service exceptions. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29790", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009631", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2549", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-57611", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421299", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29790", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "CNNVD", "id": "CNNVD-202205-2549" }, { "db": "NVD", "id": "CVE-2022-29790" } ] }, "id": "VAR-202205-0341", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421299" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:55:28.757000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193770" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "NVD", "id": "CVE-2022-29790" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29790" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29790/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "CNNVD", "id": "CNNVD-202205-2549" }, { "db": "NVD", "id": "CVE-2022-29790" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "CNNVD", "id": "CNNVD-202205-2549" }, { "db": "NVD", "id": "CVE-2022-29790" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421299" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29790" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2549" }, { "date": "2022-05-13T15:15:09.790000", "db": "NVD", "id": "CVE-2022-29790" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421299" }, { "date": "2022-05-23T00:00:00", "db": "VULMON", "id": "CVE-2022-29790" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2549" }, { "date": "2022-05-23T18:42:44.167000", "db": "NVD", "id": "CVE-2022-29790" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2549" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009631" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2549" } ], "trust": 0.6 } }
var-202110-1452
Vulnerability from variot
A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1452", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "NVD", "id": "CVE-2021-22467" } ] }, "cve": "CVE-2021-22467", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-22467", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380902", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22467", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22467", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22467", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22467", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2059", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380902", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-22467", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380902" }, { "db": "VULMON", "id": "CVE-2021-22467" }, { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "CNNVD", "id": "CNNVD-202110-2059" }, { "db": "NVD", "id": "CVE-2021-22467" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address", "sources": [ { "db": "NVD", "id": "CVE-2021-22467" }, { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "VULHUB", "id": "VHN-380902" }, { "db": "VULMON", "id": "CVE-2021-22467" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22467", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014250", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2059", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380902", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22467", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380902" }, { "db": "VULMON", "id": "CVE-2021-22467" }, { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "CNNVD", "id": "CNNVD-202110-2059" }, { "db": "NVD", "id": "CVE-2021-22467" } ] }, "id": "VAR-202110-1452", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380902" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:17:00.998000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171526" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "CNNVD", "id": "CNNVD-202110-2059" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380902" }, { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "NVD", "id": "CVE-2021-22467" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22467" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380902" }, { "db": "VULMON", "id": "CVE-2021-22467" }, { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "CNNVD", "id": "CNNVD-202110-2059" }, { "db": "NVD", "id": "CVE-2021-22467" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380902" }, { "db": "VULMON", "id": "CVE-2021-22467" }, { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "CNNVD", "id": "CNNVD-202110-2059" }, { "db": "NVD", "id": "CVE-2021-22467" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380902" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22467" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2059" }, { "date": "2021-10-28T13:15:09.537000", "db": "NVD", "id": "CVE-2021-22467" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380902" }, { "date": "2021-11-01T00:00:00", "db": "VULMON", "id": "CVE-2021-22467" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2059" }, { "date": "2021-11-01T19:19:54.290000", "db": "NVD", "id": "CVE-2021-22467" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2059" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014250" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2059" } ], "trust": 0.6 } }
var-202110-1862
Vulnerability from variot
PCManager has a Weaknesses Introduced During Design vulnerability .Successful exploitation of this vulnerability may cause that the PIN of the subscriber is changed. HarmonyOS There is an input validation vulnerability in.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1862", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "NVD", "id": "CVE-2021-37116" } ] }, "cve": "CVE-2021-37116", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37116", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398952", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37116", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37116", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37116", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37116", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202110-2219", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398952", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398952" }, { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "CNNVD", "id": "CNNVD-202110-2219" }, { "db": "NVD", "id": "CVE-2021-37116" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PCManager has a Weaknesses Introduced During Design vulnerability .Successful exploitation of this vulnerability may cause that the PIN of the subscriber is changed. HarmonyOS There is an input validation vulnerability in.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37116" }, { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "VULHUB", "id": "VHN-398952" }, { "db": "VULMON", "id": "CVE-2021-37116" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37116", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017312", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2219", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398952", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37116", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398952" }, { "db": "VULMON", "id": "CVE-2021-37116" }, { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "CNNVD", "id": "CNNVD-202110-2219" }, { "db": "NVD", "id": "CVE-2021-37116" } ] }, "id": "VAR-202110-1862", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398952" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:44:14.640000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176767" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "CNNVD", "id": "CNNVD-202110-2219" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398952" }, { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "NVD", "id": "CVE-2021-37116" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37116" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398952" }, { "db": "VULMON", "id": "CVE-2021-37116" }, { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "CNNVD", "id": "CNNVD-202110-2219" }, { "db": "NVD", "id": "CVE-2021-37116" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398952" }, { "db": "VULMON", "id": "CVE-2021-37116" }, { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "CNNVD", "id": "CNNVD-202110-2219" }, { "db": "NVD", "id": "CVE-2021-37116" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398952" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37116" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2219" }, { "date": "2022-01-03T22:15:09.287000", "db": "NVD", "id": "CVE-2021-37116" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398952" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37116" }, { "date": "2023-01-13T06:31:00", "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2219" }, { "date": "2022-01-11T19:44:30.417000", "db": "NVD", "id": "CVE-2021-37116" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2219" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017312" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2219" } ], "trust": 0.6 } }
var-202208-0507
Vulnerability from variot
The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an inadequate validation of data reliability vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0507", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" } ] }, "cve": "CVE-2022-37008", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-37008", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37008", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-37008", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-37008", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202208-2400", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" }, { "db": "NVD", "id": "CVE-2022-37008" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an inadequate validation of data reliability vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "VULHUB", "id": "VHN-427493" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37008", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-014548", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2400", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427493", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" }, { "db": "NVD", "id": "CVE-2022-37008" } ] }, "id": "VAR-202208-0507", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427493" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:22.651000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Repair measures for data forgery problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=204370" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-345", "trust": 1.1 }, { "problemtype": "Inadequate verification of data reliability (CWE-345) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37008" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37008/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" }, { "db": "NVD", "id": "CVE-2022-37008" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" }, { "db": "NVD", "id": "CVE-2022-37008" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427493" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2400" }, { "date": "2022-08-10T20:16:04.967000", "db": "NVD", "id": "CVE-2022-37008" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427493" }, { "date": "2023-09-20T08:28:00", "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2400" }, { "date": "2022-08-15T17:58:26.997000", "db": "NVD", "id": "CVE-2022-37008" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2400" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Insufficient Validation of Data Trust in Products Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014548" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2400" } ], "trust": 0.6 } }
var-202109-1959
Vulnerability from variot
There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows. EMUI , HarmonyOS , Magic UI Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1959", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" } ] }, "cve": "CVE-2021-22319", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22319", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380754", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22319", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22319", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22319", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22319", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2053", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380754", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" }, { "db": "NVD", "id": "CVE-2021-22319" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows. EMUI , HarmonyOS , Magic UI Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "VULHUB", "id": "VHN-380754" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22319", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018589", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2053", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380754", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" }, { "db": "NVD", "id": "CVE-2021-22319" } ] }, "id": "VAR-202109-1959", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380754" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:55:47.698000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202109-0000001150310956 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171906" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22319" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22319/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" }, { "db": "NVD", "id": "CVE-2021-22319" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" }, { "db": "NVD", "id": "CVE-2021-22319" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380754" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2053" }, { "date": "2022-02-25T19:15:08.823000", "db": "NVD", "id": "CVE-2021-22319" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380754" }, { "date": "2023-06-30T08:37:00", "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2053" }, { "date": "2022-03-07T17:35:13.593000", "db": "NVD", "id": "CVE-2021-22319" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2053" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Integer overflow vulnerability in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018589" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2053" } ], "trust": 0.6 } }
var-202110-1389
Vulnerability from variot
A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1389", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "NVD", "id": "CVE-2021-22452" } ] }, "cve": "CVE-2021-22452", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-22452", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380887", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22452", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22452", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22452", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22452", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2042", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380887", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380887" }, { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "CNNVD", "id": "CNNVD-202110-2042" }, { "db": "NVD", "id": "CVE-2021-22452" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address", "sources": [ { "db": "NVD", "id": "CVE-2021-22452" }, { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "VULHUB", "id": "VHN-380887" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22452", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014235", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2042", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380887", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380887" }, { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "CNNVD", "id": "CNNVD-202110-2042" }, { "db": "NVD", "id": "CVE-2021-22452" } ] }, "id": "VAR-202110-1389", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380887" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:17:01.051000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171457" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "CNNVD", "id": "CNNVD-202110-2042" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380887" }, { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "NVD", "id": "CVE-2021-22452" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22452" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380887" }, { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "CNNVD", "id": "CNNVD-202110-2042" }, { "db": "NVD", "id": "CVE-2021-22452" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380887" }, { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "CNNVD", "id": "CNNVD-202110-2042" }, { "db": "NVD", "id": "CVE-2021-22452" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380887" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2042" }, { "date": "2021-10-28T13:15:08.903000", "db": "NVD", "id": "CVE-2021-22452" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-29T00:00:00", "db": "VULHUB", "id": "VHN-380887" }, { "date": "2022-10-11T06:35:00", "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2042" }, { "date": "2021-10-29T17:39:32.697000", "db": "NVD", "id": "CVE-2021-22452" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2042" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014235" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2042" } ], "trust": 0.6 } }
var-202112-0246
Vulnerability from variot
There is a Resource Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of Service Attacks. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0246", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "NVD", "id": "CVE-2021-37068" } ] }, "cve": "CVE-2021-37068", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37068", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398902", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37068", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37068", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37068", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37068", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202112-469", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398902", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398902" }, { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "CNNVD", "id": "CNNVD-202112-469" }, { "db": "NVD", "id": "CVE-2021-37068" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Resource Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of Service Attacks. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37068" }, { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "VULHUB", "id": "VHN-398902" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37068", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015981", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-469", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398902", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398902" }, { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "CNNVD", "id": "CNNVD-202112-469" }, { "db": "NVD", "id": "CVE-2021-37068" } ] }, "id": "VAR-202112-0246", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398902" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:25:07.031000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei Smartphone Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173705" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "CNNVD", "id": "CNNVD-202112-469" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-400", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398902" }, { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "NVD", "id": "CVE-2021-37068" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37068" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398902" }, { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "CNNVD", "id": "CNNVD-202112-469" }, { "db": "NVD", "id": "CVE-2021-37068" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398902" }, { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "CNNVD", "id": "CNNVD-202112-469" }, { "db": "NVD", "id": "CVE-2021-37068" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398902" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-469" }, { "date": "2021-12-07T17:15:08.923000", "db": "NVD", "id": "CVE-2021-37068" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398902" }, { "date": "2022-12-05T03:06:00", "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-469" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37068" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-469" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015981" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-469" } ], "trust": 0.6 } }
var-202110-1849
Vulnerability from variot
There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1849", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" } ] }, "cve": "CVE-2021-37114", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37114", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398950", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2021-37114", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37114", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37114", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-37114", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2232", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398950", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" }, { "db": "NVD", "id": "CVE-2021-37114" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37114", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017375", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2232", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398950", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37114", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" }, { "db": "NVD", "id": "CVE-2021-37114" } ] }, "id": "VAR-202110-1849", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398950" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:11:12.326000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176780" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37114" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" }, { "db": "NVD", "id": "CVE-2021-37114" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" }, { "db": "NVD", "id": "CVE-2021-37114" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398950" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37114" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2232" }, { "date": "2022-01-03T22:15:09.227000", "db": "NVD", "id": "CVE-2021-37114" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398950" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37114" }, { "date": "2023-01-17T06:34:00", "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2232" }, { "date": "2022-01-11T19:39:59.973000", "db": "NVD", "id": "CVE-2021-37114" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2232" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-bounds reading vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017375" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2232" } ], "trust": 0.6 } }
var-202110-1451
Vulnerability from variot
A component of the HarmonyOS has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability. Local attackers may exploit this vulnerability to cause kernel address leakage. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1451", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "NVD", "id": "CVE-2021-22468" } ] }, "cve": "CVE-2021-22468", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-22468", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380903", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2021-22468", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-22468", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22468", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2021-22468", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202110-2061", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-380903", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380903" }, { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "CNNVD", "id": "CNNVD-202110-2061" }, { "db": "NVD", "id": "CVE-2021-22468" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability. Local attackers may exploit this vulnerability to cause kernel address leakage. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22468" }, { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "VULHUB", "id": "VHN-380903" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22468", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014251", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2061", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380903", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380903" }, { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "CNNVD", "id": "CNNVD-202110-2061" }, { "db": "NVD", "id": "CVE-2021-22468" } ] }, "id": "VAR-202110-1451", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380903" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:52.138000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171532" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "CNNVD", "id": "CNNVD-202110-2061" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.1 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380903" }, { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "NVD", "id": "CVE-2021-22468" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22468" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380903" }, { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "CNNVD", "id": "CNNVD-202110-2061" }, { "db": "NVD", "id": "CVE-2021-22468" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380903" }, { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "CNNVD", "id": "CNNVD-202110-2061" }, { "db": "NVD", "id": "CVE-2021-22468" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380903" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2061" }, { "date": "2021-10-28T13:15:09.577000", "db": "NVD", "id": "CVE-2021-22468" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-380903" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2061" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-22468" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2061" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in leaking resources to the wrong area in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014251" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2061" } ], "trust": 0.6 } }
var-202112-0345
Vulnerability from variot
There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0345", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" } ] }, "cve": "CVE-2021-37069", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-37069", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-398903", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2021-37069", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.4, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37069", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37069", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37069", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2033", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398903", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" }, { "db": "NVD", "id": "CVE-2021-37069" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "VULHUB", "id": "VHN-398903" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37069", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015863", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2033", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398903", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" }, { "db": "NVD", "id": "CVE-2021-37069" } ] }, "id": "VAR-202112-0345", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398903" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:27:33.615000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Race\u00a0condition\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173792" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37069" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" }, { "db": "NVD", "id": "CVE-2021-37069" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" }, { "db": "NVD", "id": "CVE-2021-37069" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398903" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2033" }, { "date": "2021-12-08T15:15:09.757000", "db": "NVD", "id": "CVE-2021-37069" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398903" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2033" }, { "date": "2021-12-09T17:56:13.047000", "db": "NVD", "id": "CVE-2021-37069" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2033" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Race Condition Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015863" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2033" } ], "trust": 0.6 } }
var-202111-1767
Vulnerability from variot
There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1767", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" } ] }, "cve": "CVE-2021-37133", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37133", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398969", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37133", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37133", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37133", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37133", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-2133", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398969", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" }, { "db": "NVD", "id": "CVE-2021-37133" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37133", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017589", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2133", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398969", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37133", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" }, { "db": "NVD", "id": "CVE-2021-37133" } ] }, "id": "VAR-202111-1767", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398969" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:44.535000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176794" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37133" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" }, { "db": "NVD", "id": "CVE-2021-37133" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" }, { "db": "NVD", "id": "CVE-2021-37133" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398969" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37133" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2133" }, { "date": "2022-01-03T22:15:09.800000", "db": "NVD", "id": "CVE-2021-37133" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-398969" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37133" }, { "date": "2023-01-27T05:09:00", "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2133" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-37133" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2133" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in leaking resources to the wrong area in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017589" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2133" } ], "trust": 0.6 } }
var-202207-0110
Vulnerability from variot
The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0110", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" } ] }, "cve": "CVE-2022-34737", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-34737", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-427081", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-34737", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-34737", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-34737", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-34737", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202207-411", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-427081", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34737", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "CNNVD", "id": "CNNVD-202207-411" }, { "db": "NVD", "id": "CVE-2022-34737" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34737", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013203", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-411", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52821", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427081", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34737", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "CNNVD", "id": "CNNVD-202207-411" }, { "db": "NVD", "id": "CVE-2022-34737" } ] }, "id": "VAR-202207-0110", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427081" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:40.765000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=199749" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34737" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34737/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "CNNVD", "id": "CNNVD-202207-411" }, { "db": "NVD", "id": "CVE-2022-34737" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "CNNVD", "id": "CNNVD-202207-411" }, { "db": "NVD", "id": "CVE-2022-34737" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427081" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34737" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-411" }, { "date": "2022-07-12T14:15:19.337000", "db": "NVD", "id": "CVE-2022-34737" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427081" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34737" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-411" }, { "date": "2022-07-19T12:23:31.947000", "db": "NVD", "id": "CVE-2022-34737" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-411" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013203" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-411" } ], "trust": 0.6 } }
var-202112-0235
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to nearby crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0235", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "NVD", "id": "CVE-2021-37081" } ] }, "cve": "CVE-2021-37081", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37081", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398916", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37081", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37081", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37081", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37081", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2029", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398916", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398916" }, { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "CNNVD", "id": "CNNVD-202109-2029" }, { "db": "NVD", "id": "CVE-2021-37081" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to nearby crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37081" }, { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "VULHUB", "id": "VHN-398916" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37081", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015948", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2029", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-01679", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398916", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398916" }, { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "CNNVD", "id": "CNNVD-202109-2029" }, { "db": "NVD", "id": "CVE-2021-37081" } ] }, "id": "VAR-202112-0235", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398916" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:42:41.672000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173506" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "CNNVD", "id": "CNNVD-202109-2029" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398916" }, { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "NVD", "id": "CVE-2021-37081" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37081" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398916" }, { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "CNNVD", "id": "CNNVD-202109-2029" }, { "db": "NVD", "id": "CVE-2021-37081" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398916" }, { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "CNNVD", "id": "CNNVD-202109-2029" }, { "db": "NVD", "id": "CVE-2021-37081" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398916" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2029" }, { "date": "2021-12-07T17:15:09.353000", "db": "NVD", "id": "CVE-2021-37081" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398916" }, { "date": "2022-12-05T01:52:00", "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2029" }, { "date": "2021-12-09T17:50:41.713000", "db": "NVD", "id": "CVE-2021-37081" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2029" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015948" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2029" } ], "trust": 0.6 } }
var-202112-0233
Vulnerability from variot
There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Denial of Service Attacks. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0233", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "NVD", "id": "CVE-2021-37083" } ] }, "cve": "CVE-2021-37083", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37083", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398918", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37083", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37083", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37083", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37083", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2007", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398918", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398918" }, { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "CNNVD", "id": "CNNVD-202109-2007" }, { "db": "NVD", "id": "CVE-2021-37083" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Denial of Service Attacks. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37083" }, { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "VULHUB", "id": "VHN-398918" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37083", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015945", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2007", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-01677", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398918", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398918" }, { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "CNNVD", "id": "CNNVD-202109-2007" }, { "db": "NVD", "id": "CVE-2021-37083" } ] }, "id": "VAR-202112-0233", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398918" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:37:48.825000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173486" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "CNNVD", "id": "CNNVD-202109-2007" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398918" }, { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "NVD", "id": "CVE-2021-37083" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37083" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398918" }, { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "CNNVD", "id": "CNNVD-202109-2007" }, { "db": "NVD", "id": "CVE-2021-37083" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398918" }, { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "CNNVD", "id": "CNNVD-202109-2007" }, { "db": "NVD", "id": "CVE-2021-37083" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398918" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2007" }, { "date": "2021-12-07T17:15:09.437000", "db": "NVD", "id": "CVE-2021-37083" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398918" }, { "date": "2022-12-05T01:40:00", "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2007" }, { "date": "2021-12-09T17:34:59.787000", "db": "NVD", "id": "CVE-2021-37083" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2007" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 in smartphone \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015945" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2007" } ], "trust": 0.6 } }
var-202112-0232
Vulnerability from variot
There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers which can isolate and read synchronization files of other applications across the UID sandbox. Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0232", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "NVD", "id": "CVE-2021-37086" } ] }, "cve": "CVE-2021-37086", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37086", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398921", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37086", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 8.6, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37086", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37086", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37086", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2041", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398921", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398921" }, { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "CNNVD", "id": "CNNVD-202109-2041" }, { "db": "NVD", "id": "CVE-2021-37086" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers which can isolate and read synchronization files of other applications across the UID sandbox. Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-37086" }, { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "VULHUB", "id": "VHN-398921" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37086", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016022", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2041", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103542", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398921", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398921" }, { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "CNNVD", "id": "CNNVD-202109-2041" }, { "db": "NVD", "id": "CVE-2021-37086" } ] }, "id": "VAR-202112-0232", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398921" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:43:08.718000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173798" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "CNNVD", "id": "CNNVD-202109-2041" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398921" }, { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "NVD", "id": "CVE-2021-37086" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37086" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398921" }, { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "CNNVD", "id": "CNNVD-202109-2041" }, { "db": "NVD", "id": "CVE-2021-37086" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398921" }, { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "CNNVD", "id": "CNNVD-202109-2041" }, { "db": "NVD", "id": "CVE-2021-37086" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398921" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2041" }, { "date": "2021-12-07T17:15:09.567000", "db": "NVD", "id": "CVE-2021-37086" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398921" }, { "date": "2022-12-05T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "date": "2021-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2041" }, { "date": "2021-12-09T18:28:06.863000", "db": "NVD", "id": "CVE-2021-37086" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2041" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to improper retention of permissions in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016022" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2041" } ], "trust": 0.6 } }
var-202112-0227
Vulnerability from variot
There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There are security vulnerabilities in HUAWEI HarmonyOS, which can be exploited by attackers to affect confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0227", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "NVD", "id": "CVE-2021-37091" } ] }, "cve": "CVE-2021-37091", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37091", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398927", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37091", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37091", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37091", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37091", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2039", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398927", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398927" }, { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "CNNVD", "id": "CNNVD-202109-2039" }, { "db": "NVD", "id": "CVE-2021-37091" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There are security vulnerabilities in HUAWEI HarmonyOS, which can be exploited by attackers to affect confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37091" }, { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "VULHUB", "id": "VHN-398927" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37091", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016025", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2039", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103538", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398927", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398927" }, { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "CNNVD", "id": "CNNVD-202109-2039" }, { "db": "NVD", "id": "CVE-2021-37091" } ] }, "id": "VAR-202112-0227", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398927" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:58.913000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173796" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "CNNVD", "id": "CNNVD-202109-2039" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398927" }, { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "NVD", "id": "CVE-2021-37091" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37091" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398927" }, { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "CNNVD", "id": "CNNVD-202109-2039" }, { "db": "NVD", "id": "CVE-2021-37091" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398927" }, { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "CNNVD", "id": "CNNVD-202109-2039" }, { "db": "NVD", "id": "CVE-2021-37091" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398927" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2039" }, { "date": "2021-12-07T17:15:09.780000", "db": "NVD", "id": "CVE-2021-37091" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398927" }, { "date": "2022-12-05T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2039" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37091" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2039" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016025" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2039" } ], "trust": 0.6 } }
var-202210-0284
Vulnerability from variot
The rphone module has a script that can be maliciously modified.Successful exploitation of this vulnerability may cause irreversible programs to be implanted on user devices. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0284", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "NVD", "id": "CVE-2022-41576" } ] }, "cve": "CVE-2022-41576", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-41576", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41576", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41576", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-41576", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202210-177", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "CNNVD", "id": "CNNVD-202210-177" }, { "db": "NVD", "id": "CVE-2022-41576" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The rphone module has a script that can be maliciously modified.Successful exploitation of this vulnerability may cause irreversible programs to be implanted on user devices. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-41576" }, { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "VULHUB", "id": "VHN-437801" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41576", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018796", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-177", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437801", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437801" }, { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "CNNVD", "id": "CNNVD-202210-177" }, { "db": "NVD", "id": "CVE-2022-41576" } ] }, "id": "VAR-202210-0284", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437801" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:21:35.917000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210795" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "NVD", "id": "CVE-2022-41576" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41576" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41576/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437801" }, { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "CNNVD", "id": "CNNVD-202210-177" }, { "db": "NVD", "id": "CVE-2022-41576" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437801" }, { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "CNNVD", "id": "CNNVD-202210-177" }, { "db": "NVD", "id": "CVE-2022-41576" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437801" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-177" }, { "date": "2022-10-14T16:15:20.110000", "db": "NVD", "id": "CVE-2022-41576" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437801" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-177" }, { "date": "2022-10-15T01:50:36.447000", "db": "NVD", "id": "CVE-2022-41576" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-177" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018796" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-177" } ], "trust": 0.6 } }
var-202203-0976
Vulnerability from variot
There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0976", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" } ] }, "cve": "CVE-2021-40064", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40064", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401465", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40064", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40064", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40064", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40064", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202203-971", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401465", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "CNNVD", "id": "CNNVD-202203-971" }, { "db": "NVD", "id": "CVE-2021-40064" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "VULHUB", "id": "VHN-401465" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40064", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018700", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-971", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401465", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "CNNVD", "id": "CNNVD-202203-971" }, { "db": "NVD", "id": "CVE-2021-40064" } ] }, "id": "VAR-202203-0976", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401465" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:31.698000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=186004" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40064" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40064/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "CNNVD", "id": "CNNVD-202203-971" }, { "db": "NVD", "id": "CVE-2021-40064" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "CNNVD", "id": "CNNVD-202203-971" }, { "db": "NVD", "id": "CVE-2021-40064" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401465" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-971" }, { "date": "2022-03-10T17:43:24.960000", "db": "NVD", "id": "CVE-2021-40064" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401465" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-971" }, { "date": "2022-03-14T16:17:26.763000", "db": "NVD", "id": "CVE-2021-40064" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-971" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018700" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-971" } ], "trust": 0.6 } }
var-202210-0290
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0290", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "NVD", "id": "CVE-2022-41592" } ] }, "cve": "CVE-2022-41592", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "id": "CVE-2022-41592", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41592", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41592", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2022-41592", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202210-158", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "CNNVD", "id": "CNNVD-202210-158" }, { "db": "NVD", "id": "CVE-2022-41592" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41592" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "VULHUB", "id": "VHN-437829" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41592", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018794", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-158", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437829", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437829" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "CNNVD", "id": "CNNVD-202210-158" }, { "db": "NVD", "id": "CVE-2022-41592" } ] }, "id": "VAR-202210-0290", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437829" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:17:41.222000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210792" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437829" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "NVD", "id": "CVE-2022-41592" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41592" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41592/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437829" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "CNNVD", "id": "CNNVD-202210-158" }, { "db": "NVD", "id": "CVE-2022-41592" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437829" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "CNNVD", "id": "CNNVD-202210-158" }, { "db": "NVD", "id": "CVE-2022-41592" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437829" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-158" }, { "date": "2022-10-14T16:15:26.127000", "db": "NVD", "id": "CVE-2022-41592" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437829" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-158" }, { "date": "2022-10-15T01:52:20.023000", "db": "NVD", "id": "CVE-2022-41592" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-158" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018794" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-158" } ], "trust": 0.6 } }
var-202110-1864
Vulnerability from variot
Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause confidentiality is affected. HarmonyOS There is a vulnerability related to information leakage.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. The vulnerability stems from the lack of input validation in a component of HarmonyOS. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1864", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "NVD", "id": "CVE-2021-37125" } ] }, "cve": "CVE-2021-37125", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37125", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398962", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37125", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37125", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37125", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37125", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2217", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398962", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398962" }, { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "CNNVD", "id": "CNNVD-202110-2217" }, { "db": "NVD", "id": "CVE-2021-37125" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause confidentiality is affected. HarmonyOS There is a vulnerability related to information leakage.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. The vulnerability stems from the lack of input validation in a component of HarmonyOS. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37125" }, { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "VULHUB", "id": "VHN-398962" }, { "db": "VULMON", "id": "CVE-2021-37125" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37125", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017590", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2217", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08317", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398962", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37125", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398962" }, { "db": "VULMON", "id": "CVE-2021-37125" }, { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "CNNVD", "id": "CNNVD-202110-2217" }, { "db": "NVD", "id": "CVE-2021-37125" } ] }, "id": "VAR-202110-1864", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398962" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:22:04.203000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176765" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "CNNVD", "id": "CNNVD-202110-2217" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 }, { "problemtype": "information leak (CWE-200) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398962" }, { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "NVD", "id": "CVE-2021-37125" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37125" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398962" }, { "db": "VULMON", "id": "CVE-2021-37125" }, { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "CNNVD", "id": "CNNVD-202110-2217" }, { "db": "NVD", "id": "CVE-2021-37125" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398962" }, { "db": "VULMON", "id": "CVE-2021-37125" }, { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "CNNVD", "id": "CNNVD-202110-2217" }, { "db": "NVD", "id": "CVE-2021-37125" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398962" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37125" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2217" }, { "date": "2022-01-03T22:15:09.597000", "db": "NVD", "id": "CVE-2021-37125" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-398962" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37125" }, { "date": "2023-01-27T05:17:00", "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2217" }, { "date": "2022-01-13T16:17:25.327000", "db": "NVD", "id": "CVE-2021-37125" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2217" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability regarding information leakage in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017590" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2217" } ], "trust": 0.6 } }
var-202112-0347
Vulnerability from variot
There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0347", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" } ] }, "cve": "CVE-2021-37053", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37053", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398886", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37053", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37053", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37053", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37053", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2046", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398886", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" }, { "db": "NVD", "id": "CVE-2021-37053" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "VULHUB", "id": "VHN-398886" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37053", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015861", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2046", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398886", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" }, { "db": "NVD", "id": "CVE-2021-37053" } ] }, "id": "VAR-202112-0347", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398886" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:36.733000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Service\u00a0logic\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures to handle logic errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173799" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.6, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37053" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" }, { "db": "NVD", "id": "CVE-2021-37053" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" }, { "db": "NVD", "id": "CVE-2021-37053" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398886" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2046" }, { "date": "2021-12-08T15:15:09.647000", "db": "NVD", "id": "CVE-2021-37053" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398886" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2046" }, { "date": "2021-12-09T17:55:28.810000", "db": "NVD", "id": "CVE-2021-37053" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2046" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "handling logic errors", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2046" } ], "trust": 0.6 } }
var-202112-0257
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to fake visitors to control PC,play a video,etc. Huawei Smartphones contain a vulnerability related to input validation.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0257", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "NVD", "id": "CVE-2021-37048" } ] }, "cve": "CVE-2021-37048", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37048", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398881", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37048", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37048", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37048", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37048", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2022", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398881", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398881" }, { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "CNNVD", "id": "CNNVD-202109-2022" }, { "db": "NVD", "id": "CVE-2021-37048" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to fake visitors to control PC,play a video,etc. Huawei Smartphones contain a vulnerability related to input validation.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-37048" }, { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "VULHUB", "id": "VHN-398881" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37048", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015757", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2022", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398881", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398881" }, { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "CNNVD", "id": "CNNVD-202109-2022" }, { "db": "NVD", "id": "CVE-2021-37048" } ] }, "id": "VAR-202112-0257", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398881" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:23:04.161000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173212" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "CNNVD", "id": "CNNVD-202109-2022" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398881" }, { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "NVD", "id": "CVE-2021-37048" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37048" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398881" }, { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "CNNVD", "id": "CNNVD-202109-2022" }, { "db": "NVD", "id": "CVE-2021-37048" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398881" }, { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "CNNVD", "id": "CNNVD-202109-2022" }, { "db": "NVD", "id": "CVE-2021-37048" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398881" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2022" }, { "date": "2021-12-07T17:15:08.427000", "db": "NVD", "id": "CVE-2021-37048" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398881" }, { "date": "2022-11-30T01:30:00", "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2022" }, { "date": "2021-12-09T17:41:06.607000", "db": "NVD", "id": "CVE-2021-37048" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2022" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015757" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2022" } ], "trust": 0.6 } }
var-202111-0850
Vulnerability from variot
There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones are vulnerable to information disclosure.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0850", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "NVD", "id": "CVE-2021-37010" } ] }, "cve": "CVE-2021-37010", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37010", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398842", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37010", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37010", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37010", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37010", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1881", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398842", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398842" }, { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "CNNVD", "id": "CNNVD-202111-1881" }, { "db": "NVD", "id": "CVE-2021-37010" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones are vulnerable to information disclosure.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37010" }, { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "VULHUB", "id": "VHN-398842" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37010", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015588", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1881", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398842", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398842" }, { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "CNNVD", "id": "CNNVD-202111-1881" }, { "db": "NVD", "id": "CVE-2021-37010" } ] }, "id": "VAR-202111-0850", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398842" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:22:03.564000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Repair measures for information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172180" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "CNNVD", "id": "CNNVD-202111-1881" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 }, { "problemtype": "information leak (CWE-200) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398842" }, { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "NVD", "id": "CVE-2021-37010" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37010" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398842" }, { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "CNNVD", "id": "CNNVD-202111-1881" }, { "db": "NVD", "id": "CVE-2021-37010" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398842" }, { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "CNNVD", "id": "CNNVD-202111-1881" }, { "db": "NVD", "id": "CVE-2021-37010" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398842" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1881" }, { "date": "2021-11-23T16:15:09.113000", "db": "NVD", "id": "CVE-2021-37010" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398842" }, { "date": "2022-11-24T09:13:00", "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1881" }, { "date": "2021-11-29T15:51:38.447000", "db": "NVD", "id": "CVE-2021-37010" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1881" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Information disclosure vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015588" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1881" } ], "trust": 0.6 } }
var-202209-0322
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0322", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" } ] }, "cve": "CVE-2022-38979", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38979", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38979", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38979", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-38979", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-184", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "CNNVD", "id": "CNNVD-202209-184" }, { "db": "NVD", "id": "CVE-2022-38979" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "VULHUB", "id": "VHN-428508" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38979", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016793", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-184", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428508", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428508" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "CNNVD", "id": "CNNVD-202209-184" }, { "db": "NVD", "id": "CVE-2022-38979" } ] }, "id": "VAR-202209-0322", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428508" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:16.874000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208086" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38979" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38979/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428508" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "CNNVD", "id": "CNNVD-202209-184" }, { "db": "NVD", "id": "CVE-2022-38979" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428508" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "CNNVD", "id": "CNNVD-202209-184" }, { "db": "NVD", "id": "CVE-2022-38979" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428508" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-184" }, { "date": "2022-09-16T18:15:17.387000", "db": "NVD", "id": "CVE-2022-38979" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428508" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-184" }, { "date": "2022-09-17T03:18:37.613000", "db": "NVD", "id": "CVE-2022-38979" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-184" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-184" } ], "trust": 0.6 } }
var-202302-0392
Vulnerability from variot
The IHwAntiMalPlugin interface lacks permission verification. Successful exploitation of this vulnerability can lead to filling problems (batch installation of applications). EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0392", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "NVD", "id": "CVE-2022-48295" } ] }, "cve": "CVE-2022-48295", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-48295", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-48295", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48295", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-48295", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202302-352", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "CNNVD", "id": "CNNVD-202302-352" }, { "db": "NVD", "id": "CVE-2022-48295" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The IHwAntiMalPlugin interface lacks permission verification. Successful exploitation of this vulnerability can lead to filling problems (batch installation of applications). EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-48295" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "VULHUB", "id": "VHN-453375" }, { "db": "VULMON", "id": "CVE-2022-48295" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48295", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003621", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-352", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453375", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48295", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453375" }, { "db": "VULMON", "id": "CVE-2022-48295" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "CNNVD", "id": "CNNVD-202302-352" }, { "db": "NVD", "id": "CVE-2022-48295" } ] }, "id": "VAR-202302-0392", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453375" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:15.677000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225929" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453375" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "NVD", "id": "CVE-2022-48295" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48295" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48295/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453375" }, { "db": "VULMON", "id": "CVE-2022-48295" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "CNNVD", "id": "CNNVD-202302-352" }, { "db": "NVD", "id": "CVE-2022-48295" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453375" }, { "db": "VULMON", "id": "CVE-2022-48295" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "CNNVD", "id": "CNNVD-202302-352" }, { "db": "NVD", "id": "CVE-2022-48295" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453375" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48295" }, { "date": "2023-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-352" }, { "date": "2023-02-09T17:15:14.113000", "db": "NVD", "id": "CVE-2022-48295" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-17T00:00:00", "db": "VULHUB", "id": "VHN-453375" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48295" }, { "date": "2023-09-14T07:48:00", "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "date": "2023-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-352" }, { "date": "2023-02-17T13:43:06.680000", "db": "NVD", "id": "CVE-2022-48295" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-352" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Permission Preservation Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003621" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-352" } ], "trust": 0.6 } }
var-202112-0343
Vulnerability from variot
There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei An incomplete cleanup vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. HUAWEI HarmonyOS has a resource management error vulnerability. This vulnerability is caused by a resource not closing or releasing vulnerability in a certain component of HarmonyOS. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0343", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" } ] }, "cve": "CVE-2021-37092", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37092", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398928", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37092", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37092", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37092", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37092", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2038", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398928", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" }, { "db": "NVD", "id": "CVE-2021-37092" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei An incomplete cleanup vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. HUAWEI HarmonyOS has a resource management error vulnerability. This vulnerability is caused by a resource not closing or releasing vulnerability in a certain component of HarmonyOS. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "VULHUB", "id": "VHN-398928" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37092", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015866", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2038", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08328", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398928", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" }, { "db": "NVD", "id": "CVE-2021-37092" } ] }, "id": "VAR-202112-0343", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398928" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:11:10.103000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Memory\u00a0leakage\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173795" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-459", "trust": 1.1 }, { "problemtype": "incomplete cleanup (CWE-459) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37092" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" }, { "db": "NVD", "id": "CVE-2021-37092" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" }, { "db": "NVD", "id": "CVE-2021-37092" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398928" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2038" }, { "date": "2021-12-08T15:15:09.920000", "db": "NVD", "id": "CVE-2021-37092" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398928" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2038" }, { "date": "2021-12-09T17:59:00.210000", "db": "NVD", "id": "CVE-2021-37092" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2038" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Incomplete Cleanup Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015866" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2038" } ], "trust": 0.6 } }
var-202210-0285
Vulnerability from variot
The storage maintenance and debugging module has an array out-of-bounds read vulnerability.Successful exploitation of this vulnerability will cause incorrect statistics of this module
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0285", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41583" } ] }, "cve": "CVE-2022-41583", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-41583", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41583", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-172", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-172" }, { "db": "NVD", "id": "CVE-2022-41583" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The storage maintenance and debugging module has an array out-of-bounds read vulnerability.Successful exploitation of this vulnerability will cause incorrect statistics of this module", "sources": [ { "db": "NVD", "id": "CVE-2022-41583" }, { "db": "VULHUB", "id": "VHN-437814" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41583", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-172", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437814", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437814" }, { "db": "CNNVD", "id": "CNNVD-202210-172" }, { "db": "NVD", "id": "CVE-2022-41583" } ] }, "id": "VAR-202210-0285", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437814" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:06.812000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211154" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437814" }, { "db": "NVD", "id": "CVE-2022-41583" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41583/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437814" }, { "db": "CNNVD", "id": "CNNVD-202210-172" }, { "db": "NVD", "id": "CVE-2022-41583" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437814" }, { "db": "CNNVD", "id": "CNNVD-202210-172" }, { "db": "NVD", "id": "CVE-2022-41583" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437814" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-172" }, { "date": "2022-10-14T16:15:22.813000", "db": "NVD", "id": "CVE-2022-41583" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437814" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-172" }, { "date": "2022-10-18T17:27:17.167000", "db": "NVD", "id": "CVE-2022-41583" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-172" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-172" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-172" } ], "trust": 0.6 } }
var-202112-0949
Vulnerability from variot
Vulnerability of design defects in the security algorithm component. Successful exploitation of this vulnerability may affect confidentiality. HarmonyOS Exists in the use of cryptographic algorithms.Information may be obtained. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0949", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "NVD", "id": "CVE-2021-40006" } ] }, "cve": "CVE-2021-40006", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-40006", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2022-05175", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-401407", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "id": "CVE-2021-40006", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.6, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40006", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40006", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-40006", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-05175", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202112-209", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401407", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "VULHUB", "id": "VHN-401407" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "CNNVD", "id": "CNNVD-202112-209" }, { "db": "NVD", "id": "CVE-2021-40006" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability of design defects in the security algorithm component. Successful exploitation of this vulnerability may affect confidentiality. HarmonyOS Exists in the use of cryptographic algorithms.Information may be obtained. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40006" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "VULHUB", "id": "VHN-401407" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40006", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017515", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05175", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-209", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401407", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "VULHUB", "id": "VHN-401407" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "CNNVD", "id": "CNNVD-202112-209" }, { "db": "NVD", "id": "CVE-2021-40006" } ] }, "id": "VAR-202112-0949", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "VULHUB", "id": "VHN-401407" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05175" } ] }, "last_update_date": "2024-08-14T14:50:02.878000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Huawei HarmonyOS Wearables Encryption Issue Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/315076" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172733" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "CNNVD", "id": "CNNVD-202112-209" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-327", "trust": 1.1 }, { "problemtype": "CWE-254", "trust": 1.0 }, { "problemtype": "Use of incomplete or dangerous cryptographic algorithms (CWE-327) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401407" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "NVD", "id": "CVE-2021-40006" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40006" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" }, { "trust": 1.0, "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "trust": 1.0, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "VULHUB", "id": "VHN-401407" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "CNNVD", "id": "CNNVD-202112-209" }, { "db": "NVD", "id": "CVE-2021-40006" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "VULHUB", "id": "VHN-401407" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "CNNVD", "id": "CNNVD-202112-209" }, { "db": "NVD", "id": "CVE-2021-40006" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05175" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401407" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-209" }, { "date": "2022-01-10T14:10:21.260000", "db": "NVD", "id": "CVE-2021-40006" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05175" }, { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401407" }, { "date": "2023-01-24T05:25:00", "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-209" }, { "date": "2023-08-13T13:15:08.720000", "db": "NVD", "id": "CVE-2021-40006" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in using cryptographic algorithms in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017515" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-209" } ], "trust": 0.6 } }
var-202204-0532
Vulnerability from variot
The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI contains a vulnerability related to insufficient data integrity verification.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0532", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" } ] }, "cve": "CVE-2022-22253", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-22253", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409782", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-22253", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22253", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-22253", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-22253", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202204-2020", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409782", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22253", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" }, { "db": "NVD", "id": "CVE-2022-22253" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI contains a vulnerability related to insufficient data integrity verification.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22253", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007945", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2020", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44623", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409782", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22253", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" }, { "db": "NVD", "id": "CVE-2022-22253" } ] }, "id": "VAR-202204-0532", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409782" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:18:01.694000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=189779" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-354", "trust": 1.1 }, { "problemtype": "Incomplete data integrity verification (CWE-354) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22253" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22253/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/354.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" }, { "db": "NVD", "id": "CVE-2022-22253" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" }, { "db": "NVD", "id": "CVE-2022-22253" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409782" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22253" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2020" }, { "date": "2022-04-11T20:15:19.523000", "db": "NVD", "id": "CVE-2022-22253" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-18T00:00:00", "db": "VULHUB", "id": "VHN-409782" }, { "date": "2022-04-18T00:00:00", "db": "VULMON", "id": "CVE-2022-22253" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2020" }, { "date": "2022-04-18T20:48:02.157000", "db": "NVD", "id": "CVE-2022-22253" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2020" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to insufficient data integrity verification in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007945" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2020" } ], "trust": 0.6 } }
var-202207-0182
Vulnerability from variot
The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0182", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" } ] }, "cve": "CVE-2022-34739", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-34739", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-427091", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-34739", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-34739", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-34739", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-34739", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202207-393", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427091", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34739", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "CNNVD", "id": "CNNVD-202207-393" }, { "db": "NVD", "id": "CVE-2022-34739" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34739", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013201", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-393", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52824", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427091", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34739", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "CNNVD", "id": "CNNVD-202207-393" }, { "db": "NVD", "id": "CVE-2022-34739" } ] }, "id": "VAR-202207-0182", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427091" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:31.229000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=199744" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34739" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34739/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "CNNVD", "id": "CNNVD-202207-393" }, { "db": "NVD", "id": "CVE-2022-34739" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "CNNVD", "id": "CNNVD-202207-393" }, { "db": "NVD", "id": "CVE-2022-34739" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427091" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34739" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-393" }, { "date": "2022-07-12T14:15:19.417000", "db": "NVD", "id": "CVE-2022-34739" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427091" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34739" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-393" }, { "date": "2022-07-19T12:47:45.723000", "db": "NVD", "id": "CVE-2022-34739" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-393" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013201" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-393" } ], "trust": 0.6 } }
var-202112-0263
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious invoking other functions of the Smart Assistant through text messages. Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from the failure of the network system or product to properly verify the input data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0263", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "NVD", "id": "CVE-2021-37084" } ] }, "cve": "CVE-2021-37084", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37084", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398919", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37084", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37084", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37084", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37084", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2006", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398919", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398919" }, { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "CNNVD", "id": "CNNVD-202109-2006" }, { "db": "NVD", "id": "CVE-2021-37084" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious invoking other functions of the Smart Assistant through text messages. Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from the failure of the network system or product to properly verify the input data", "sources": [ { "db": "NVD", "id": "CVE-2021-37084" }, { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "VULHUB", "id": "VHN-398919" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37084", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016020", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2006", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-01676", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398919", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398919" }, { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "CNNVD", "id": "CNNVD-202109-2006" }, { "db": "NVD", "id": "CVE-2021-37084" } ] }, "id": "VAR-202112-0263", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398919" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:36.800000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173784" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "CNNVD", "id": "CNNVD-202109-2006" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398919" }, { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "NVD", "id": "CVE-2021-37084" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37084" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398919" }, { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "CNNVD", "id": "CNNVD-202109-2006" }, { "db": "NVD", "id": "CVE-2021-37084" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398919" }, { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "CNNVD", "id": "CNNVD-202109-2006" }, { "db": "NVD", "id": "CVE-2021-37084" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398919" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2006" }, { "date": "2021-12-07T17:15:09.480000", "db": "NVD", "id": "CVE-2021-37084" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398919" }, { "date": "2022-12-05T06:54:00", "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "date": "2021-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2006" }, { "date": "2021-12-09T15:14:51.153000", "db": "NVD", "id": "CVE-2021-37084" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2006" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016020" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2006" } ], "trust": 0.6 } }
var-202112-0344
Vulnerability from variot
There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0344", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" } ] }, "cve": "CVE-2021-37074", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2021-37074", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-398908", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2021-37074", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37074", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37074", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37074", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2036", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398908", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" }, { "db": "NVD", "id": "CVE-2021-37074" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "VULHUB", "id": "VHN-398908" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37074", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015864", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2036", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398908", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" }, { "db": "NVD", "id": "CVE-2021-37074" } ] }, "id": "VAR-202112-0344", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398908" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:57.044000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Race\u00a0condition\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173794" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37074" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" }, { "db": "NVD", "id": "CVE-2021-37074" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" }, { "db": "NVD", "id": "CVE-2021-37074" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398908" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2036" }, { "date": "2021-12-08T15:15:09.807000", "db": "NVD", "id": "CVE-2021-37074" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398908" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2036" }, { "date": "2021-12-09T17:55:40.317000", "db": "NVD", "id": "CVE-2021-37074" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2036" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Race Condition Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015864" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2036" } ], "trust": 0.6 } }
var-202110-1866
Vulnerability from variot
Changlian Blocklist has a Business Logic Errors vulnerability .Successful exploitation of this vulnerability may expand the attack surface of the message class. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1866", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "NVD", "id": "CVE-2021-39968" } ] }, "cve": "CVE-2021-39968", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-39968", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401369", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-39968", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39968", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39968", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39968", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2215", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401369", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401369" }, { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "CNNVD", "id": "CNNVD-202110-2215" }, { "db": "NVD", "id": "CVE-2021-39968" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Changlian Blocklist has a Business Logic Errors vulnerability .Successful exploitation of this vulnerability may expand the attack surface of the message class. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-39968" }, { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "VULHUB", "id": "VHN-401369" }, { "db": "VULMON", "id": "CVE-2021-39968" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39968", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017613", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2215", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401369", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39968", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401369" }, { "db": "VULMON", "id": "CVE-2021-39968" }, { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "CNNVD", "id": "CNNVD-202110-2215" }, { "db": "NVD", "id": "CVE-2021-39968" } ] }, "id": "VAR-202110-1866", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401369" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:42:43.155000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176763" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "CNNVD", "id": "CNNVD-202110-2215" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "NVD", "id": "CVE-2021-39968" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39968" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401369" }, { "db": "VULMON", "id": "CVE-2021-39968" }, { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "CNNVD", "id": "CNNVD-202110-2215" }, { "db": "NVD", "id": "CVE-2021-39968" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401369" }, { "db": "VULMON", "id": "CVE-2021-39968" }, { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "CNNVD", "id": "CNNVD-202110-2215" }, { "db": "NVD", "id": "CVE-2021-39968" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401369" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39968" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2215" }, { "date": "2022-01-03T22:15:10.047000", "db": "NVD", "id": "CVE-2021-39968" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401369" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39968" }, { "date": "2023-01-27T07:18:00", "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2215" }, { "date": "2022-01-13T16:28:17.993000", "db": "NVD", "id": "CVE-2021-39968" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2215" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017613" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2215" } ], "trust": 0.6 } }
var-202210-0345
Vulnerability from variot
The MPTCP module has an out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause root privilege escalation attacks implemented by modifying program information. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0345", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "NVD", "id": "CVE-2022-41578" } ] }, "cve": "CVE-2022-41578", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-41578", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41578", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41578", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-41578", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202210-175", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "CNNVD", "id": "CNNVD-202210-175" }, { "db": "NVD", "id": "CVE-2022-41578" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has an out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause root privilege escalation attacks implemented by modifying program information. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-41578" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "VULHUB", "id": "VHN-437805" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41578", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018743", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-175", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437805", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437805" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "CNNVD", "id": "CNNVD-202210-175" }, { "db": "NVD", "id": "CVE-2022-41578" } ] }, "id": "VAR-202210-0345", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437805" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:27:04.467000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211156" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437805" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "NVD", "id": "CVE-2022-41578" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41578" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41578/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437805" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "CNNVD", "id": "CNNVD-202210-175" }, { "db": "NVD", "id": "CVE-2022-41578" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437805" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "CNNVD", "id": "CNNVD-202210-175" }, { "db": "NVD", "id": "CVE-2022-41578" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437805" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-175" }, { "date": "2022-10-14T16:15:21.030000", "db": "NVD", "id": "CVE-2022-41578" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437805" }, { "date": "2023-10-23T06:35:00", "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-175" }, { "date": "2022-10-18T14:49:46.290000", "db": "NVD", "id": "CVE-2022-41578" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-175" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018743" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-175" } ], "trust": 0.6 } }
var-202209-0366
Vulnerability from variot
The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0366", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "NVD", "id": "CVE-2022-38999" } ] }, "cve": "CVE-2022-38999", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38999", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38999", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38999", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-38999", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202209-170", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "CNNVD", "id": "CNNVD-202209-170" }, { "db": "NVD", "id": "CVE-2022-38999" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-38999" }, { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "VULHUB", "id": "VHN-434770" }, { "db": "VULMON", "id": "CVE-2022-38999" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38999", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017155", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-170", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434770", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-38999", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434770" }, { "db": "VULMON", "id": "CVE-2022-38999" }, { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "CNNVD", "id": "CNNVD-202209-170" }, { "db": "NVD", "id": "CVE-2022-38999" } ] }, "id": "VAR-202209-0366", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434770" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:16:30.332000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208080" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "NVD", "id": "CVE-2022-38999" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38999" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38999/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434770" }, { "db": "VULMON", "id": "CVE-2022-38999" }, { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "CNNVD", "id": "CNNVD-202209-170" }, { "db": "NVD", "id": "CVE-2022-38999" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434770" }, { "db": "VULMON", "id": "CVE-2022-38999" }, { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "CNNVD", "id": "CNNVD-202209-170" }, { "db": "NVD", "id": "CVE-2022-38999" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434770" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-38999" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-170" }, { "date": "2022-09-16T18:15:17.860000", "db": "NVD", "id": "CVE-2022-38999" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-434770" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-38999" }, { "date": "2023-10-11T08:51:00", "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-170" }, { "date": "2022-09-20T18:58:51.147000", "db": "NVD", "id": "CVE-2022-38999" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-170" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017155" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-170" } ], "trust": 0.6 } }
var-202108-0280
Vulnerability from variot
A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution. HarmonyOS Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0280", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "NVD", "id": "CVE-2021-22416" } ] }, "cve": "CVE-2021-22416", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2021-22416", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380851", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22416", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22416", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22416", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22416", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202108-315", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380851", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22416", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380851" }, { "db": "VULMON", "id": "CVE-2021-22416" }, { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "CNNVD", "id": "CNNVD-202108-315" }, { "db": "NVD", "id": "CVE-2021-22416" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution. HarmonyOS Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22416" }, { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "VULHUB", "id": "VHN-380851" }, { "db": "VULMON", "id": "CVE-2021-22416" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22416", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009381", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-315", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380851", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22416", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380851" }, { "db": "VULMON", "id": "CVE-2021-22416" }, { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "CNNVD", "id": "CNNVD-202108-315" }, { "db": "NVD", "id": "CVE-2021-22416" } ] }, "id": "VAR-202108-0280", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380851" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:57.234000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=159646" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "CNNVD", "id": "CNNVD-202108-315" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "NVD", "id": "CVE-2021-22416" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22416" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380851" }, { "db": "VULMON", "id": "CVE-2021-22416" }, { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "CNNVD", "id": "CNNVD-202108-315" }, { "db": "NVD", "id": "CVE-2021-22416" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380851" }, { "db": "VULMON", "id": "CVE-2021-22416" }, { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "CNNVD", "id": "CNNVD-202108-315" }, { "db": "NVD", "id": "CVE-2021-22416" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380851" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22416" }, { "date": "2022-04-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-315" }, { "date": "2021-08-03T18:15:07.973000", "db": "NVD", "id": "CVE-2021-22416" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-380851" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22416" }, { "date": "2022-04-22T07:25:00", "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-315" }, { "date": "2021-08-11T13:17:52.347000", "db": "NVD", "id": "CVE-2021-22416" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-315" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009381" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-315" } ], "trust": 0.6 } }
var-202111-1784
Vulnerability from variot
The screen lock module has a Stack-based Buffer Overflow vulnerability.Successful exploitation of this vulnerability may affect user experience. HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Attackers can exploit this vulnerability to affect user availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1784", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "NVD", "id": "CVE-2021-39990" } ] }, "cve": "CVE-2021-39990", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-39990", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401391", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-39990", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39990", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39990", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-39990", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202111-2122", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401391", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-39990", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401391" }, { "db": "VULMON", "id": "CVE-2021-39990" }, { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "CNNVD", "id": "CNNVD-202111-2122" }, { "db": "NVD", "id": "CVE-2021-39990" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The screen lock module has a Stack-based Buffer Overflow vulnerability.Successful exploitation of this vulnerability may affect user experience. HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Attackers can exploit this vulnerability to affect user availability", "sources": [ { "db": "NVD", "id": "CVE-2021-39990" }, { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "VULHUB", "id": "VHN-401391" }, { "db": "VULMON", "id": "CVE-2021-39990" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39990", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017724", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2122", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08453", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401391", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39990", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401391" }, { "db": "VULMON", "id": "CVE-2021-39990" }, { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "CNNVD", "id": "CNNVD-202111-2122" }, { "db": "NVD", "id": "CVE-2021-39990" } ] }, "id": "VAR-202111-1784", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401391" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:22:03.013000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176783" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "CNNVD", "id": "CNNVD-202111-2122" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401391" }, { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "NVD", "id": "CVE-2021-39990" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39990" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401391" }, { "db": "VULMON", "id": "CVE-2021-39990" }, { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "CNNVD", "id": "CNNVD-202111-2122" }, { "db": "NVD", "id": "CVE-2021-39990" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401391" }, { "db": "VULMON", "id": "CVE-2021-39990" }, { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "CNNVD", "id": "CNNVD-202111-2122" }, { "db": "NVD", "id": "CVE-2021-39990" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401391" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39990" }, { "date": "2023-02-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2122" }, { "date": "2022-01-03T22:15:11.030000", "db": "NVD", "id": "CVE-2021-39990" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-14T00:00:00", "db": "VULHUB", "id": "VHN-401391" }, { "date": "2022-01-14T00:00:00", "db": "VULMON", "id": "CVE-2021-39990" }, { "date": "2023-02-02T02:19:00", "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2122" }, { "date": "2022-01-14T16:04:15.630000", "db": "NVD", "id": "CVE-2021-39990" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2122" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017724" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2122" } ], "trust": 0.6 } }
var-202204-1427
Vulnerability from variot
The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. An attacker could exploit this vulnerability to bypass web authentication and gain administrative access to the device
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1427", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" } ] }, "cve": "CVE-2021-46742", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-46742", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-418651", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-46742", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46742", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46742", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-46742", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202204-2022", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-418651", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46742", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" }, { "db": "NVD", "id": "CVE-2021-46742" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. An attacker could exploit this vulnerability to bypass web authentication and gain administrative access to the device", "sources": [ { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46742", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007971", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2022", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44618", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-418651", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46742", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" }, { "db": "NVD", "id": "CVE-2021-46742" } ] }, "id": "VAR-202204-1427", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418651" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:45.534000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=189573" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46742" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46742/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" }, { "db": "NVD", "id": "CVE-2021-46742" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" }, { "db": "NVD", "id": "CVE-2021-46742" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-418651" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2021-46742" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2022" }, { "date": "2022-04-11T20:15:16.397000", "db": "NVD", "id": "CVE-2021-46742" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-418651" }, { "date": "2022-04-15T00:00:00", "db": "VULMON", "id": "CVE-2021-46742" }, { "date": "2023-07-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2022" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-46742" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2022" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007971" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2022" } ], "trust": 0.6 } }
var-202110-1435
Vulnerability from variot
A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause the memory which is not released. HarmonyOS Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1435", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "NVD", "id": "CVE-2021-22455" } ] }, "cve": "CVE-2021-22455", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22455", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380890", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22455", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22455", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22455", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22455", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202110-2045", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380890", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380890" }, { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "CNNVD", "id": "CNNVD-202110-2045" }, { "db": "NVD", "id": "CVE-2021-22455" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause the memory which is not released. HarmonyOS Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22455" }, { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "VULHUB", "id": "VHN-380890" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22455", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014462", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2045", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380890", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380890" }, { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "CNNVD", "id": "CNNVD-202110-2045" }, { "db": "NVD", "id": "CVE-2021-22455" } ] }, "id": "VAR-202110-1435", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380890" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:52.163000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171477" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "CNNVD", "id": "CNNVD-202110-2045" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380890" }, { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "NVD", "id": "CVE-2021-22455" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22455" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380890" }, { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "CNNVD", "id": "CNNVD-202110-2045" }, { "db": "NVD", "id": "CVE-2021-22455" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380890" }, { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "CNNVD", "id": "CNNVD-202110-2045" }, { "db": "NVD", "id": "CVE-2021-22455" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380890" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2045" }, { "date": "2021-10-28T13:15:09.027000", "db": "NVD", "id": "CVE-2021-22455" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380890" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2045" }, { "date": "2021-11-02T12:35:39.873000", "db": "NVD", "id": "CVE-2021-22455" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2045" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014462" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2045" } ], "trust": 0.6 } }
var-202108-2288
Vulnerability from variot
There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2288", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" } ] }, "cve": "CVE-2021-22489", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22489", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380924", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22489", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22489", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22489", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22489", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202108-2826", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380924", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" }, { "db": "NVD", "id": "CVE-2021-22489" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "VULHUB", "id": "VHN-380924" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22489", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018971", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-2826", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380924", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" }, { "db": "NVD", "id": "CVE-2021-22489" } ] }, "id": "VAR-202108-2288", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380924" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:23:23.548000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202108-0000001181125881 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172020" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22489" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22489/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" }, { "db": "NVD", "id": "CVE-2021-22489" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" }, { "db": "NVD", "id": "CVE-2021-22489" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380924" }, { "date": "2023-07-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2826" }, { "date": "2022-02-25T19:15:11.340000", "db": "NVD", "id": "CVE-2021-22489" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-08T00:00:00", "db": "VULHUB", "id": "VHN-380924" }, { "date": "2023-07-12T07:22:00", "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2826" }, { "date": "2022-03-08T13:52:39.587000", "db": "NVD", "id": "CVE-2021-22489" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2826" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2826" } ], "trust": 0.6 } }
var-202208-0888
Vulnerability from variot
Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI EMUI is a mobile operating system developed based on Android
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0888", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" } ] }, "cve": "CVE-2021-40040", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40040", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40040", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40040", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40040", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202208-2783", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" }, { "db": "NVD", "id": "CVE-2021-40040" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI EMUI is a mobile operating system developed based on Android", "sources": [ { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "VULHUB", "id": "VHN-401441" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40040", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-020146", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2783", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-81251", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401441", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401441" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" }, { "db": "NVD", "id": "CVE-2021-40040" } ] }, "id": "VAR-202208-0888", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401441" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:40.188000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI and Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=204272" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40040" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40040/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401441" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" }, { "db": "NVD", "id": "CVE-2021-40040" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401441" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" }, { "db": "NVD", "id": "CVE-2021-40040" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-401441" }, { "date": "2023-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2783" }, { "date": "2022-08-10T20:15:22.443000", "db": "NVD", "id": "CVE-2021-40040" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-27T00:00:00", "db": "VULHUB", "id": "VHN-401441" }, { "date": "2023-09-19T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2783" }, { "date": "2022-10-27T19:04:30.717000", "db": "NVD", "id": "CVE-2021-40040" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2783" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2783" } ], "trust": 0.6 } }
var-202207-0181
Vulnerability from variot
The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0181", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "NVD", "id": "CVE-2022-34735" } ] }, "cve": "CVE-2022-34735", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-34735", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-427082", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-34735", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34735", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-34735", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-34735", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202207-408", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427082", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-34735", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "CNNVD", "id": "CNNVD-202207-408" }, { "db": "NVD", "id": "CVE-2022-34735" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34735", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013205", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-408", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52822", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427082", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34735", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "CNNVD", "id": "CNNVD-202207-408" }, { "db": "NVD", "id": "CVE-2022-34735" } ] }, "id": "VAR-202207-0181", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427082" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:27:14.459000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=200885" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "NVD", "id": "CVE-2022-34735" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34735" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34735/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/476.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "CNNVD", "id": "CNNVD-202207-408" }, { "db": "NVD", "id": "CVE-2022-34735" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "CNNVD", "id": "CNNVD-202207-408" }, { "db": "NVD", "id": "CVE-2022-34735" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427082" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34735" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-408" }, { "date": "2022-07-12T14:15:19.260000", "db": "NVD", "id": "CVE-2022-34735" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427082" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34735" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "date": "2022-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-408" }, { "date": "2022-07-19T11:42:57.720000", "db": "NVD", "id": "CVE-2022-34735" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-408" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013205" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-408" } ], "trust": 0.6 } }
var-202212-0383
Vulnerability from variot
The system service has a vulnerability that causes incorrect return values. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0383", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "NVD", "id": "CVE-2022-41599" } ] }, "cve": "CVE-2022-41599", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-41599", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41599", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41599", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-41599", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202212-2499", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "CNNVD", "id": "CNNVD-202212-2499" }, { "db": "NVD", "id": "CVE-2022-41599" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system service has a vulnerability that causes incorrect return values. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-41599" }, { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "VULHUB", "id": "VHN-437842" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41599", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023882", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2499", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437842", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437842" }, { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "CNNVD", "id": "CNNVD-202212-2499" }, { "db": "NVD", "id": "CVE-2022-41599" } ] }, "id": "VAR-202212-0383", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437842" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:42:05.530000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218953" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "NVD", "id": "CVE-2022-41599" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41599" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41599/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437842" }, { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "CNNVD", "id": "CNNVD-202212-2499" }, { "db": "NVD", "id": "CVE-2022-41599" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437842" }, { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "CNNVD", "id": "CNNVD-202212-2499" }, { "db": "NVD", "id": "CVE-2022-41599" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-437842" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2499" }, { "date": "2022-12-20T21:15:10.957000", "db": "NVD", "id": "CVE-2022-41599" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-437842" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2499" }, { "date": "2022-12-24T04:13:01.250000", "db": "NVD", "id": "CVE-2022-41599" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2499" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023882" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2499" } ], "trust": 0.6 } }
var-202212-0422
Vulnerability from variot
The TelephonyProvider module has a vulnerability in obtaining values.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0422", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "db": "NVD", "id": "CVE-2022-46310" } ] }, "cve": "CVE-2022-46310", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-46310", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46310", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46310", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-46310", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202212-2491", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "db": "CNNVD", "id": "CNNVD-202212-2491" }, { "db": "NVD", "id": "CVE-2022-46310" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The TelephonyProvider module has a vulnerability in obtaining values.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-46310" }, { "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "db": "VULHUB", "id": "VHN-444280" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46310", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023883", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2491", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444280", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444280" }, { "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "db": "CNNVD", "id": "CNNVD-202212-2491" }, { "db": "NVD", "id": "CVE-2022-46310" } ] }, "id": "VAR-202212-0422", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444280" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:11.099000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218948" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2491" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "db": "NVD", "id": "CVE-2022-46310" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46310" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46310/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444280" }, { "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "db": "CNNVD", "id": "CNNVD-202212-2491" }, { "db": "NVD", "id": "CVE-2022-46310" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444280" }, { "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "db": "CNNVD", "id": "CNNVD-202212-2491" }, { "db": "NVD", "id": "CVE-2022-46310" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444280" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2491" }, { "date": "2022-12-20T21:15:11.153000", "db": "NVD", "id": "CVE-2022-46310" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444280" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2491" }, { "date": "2022-12-24T04:13:18.860000", "db": "NVD", "id": "CVE-2022-46310" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2491" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023883" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2491" } ], "trust": 0.6 } }
var-202205-0249
Vulnerability from variot
The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0249", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "NVD", "id": "CVE-2022-29791" } ] }, "cve": "CVE-2022-29791", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-29791", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421300", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-29791", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29791", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29791", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-29791", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202205-2546", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421300", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421300" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "CNNVD", "id": "CNNVD-202205-2546" }, { "db": "NVD", "id": "CVE-2022-29791" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-29791" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "VULHUB", "id": "VHN-421300" }, { "db": "VULMON", "id": "CVE-2022-29791" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29791", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009630", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2546", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-53575", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421300", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29791", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421300" }, { "db": "VULMON", "id": "CVE-2022-29791" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "CNNVD", "id": "CNNVD-202205-2546" }, { "db": "NVD", "id": "CVE-2022-29791" } ] }, "id": "VAR-202205-0249", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421300" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:24.125000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193767" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "NVD", "id": "CVE-2022-29791" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29791" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29791/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421300" }, { "db": "VULMON", "id": "CVE-2022-29791" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "CNNVD", "id": "CNNVD-202205-2546" }, { "db": "NVD", "id": "CVE-2022-29791" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421300" }, { "db": "VULMON", "id": "CVE-2022-29791" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "CNNVD", "id": "CNNVD-202205-2546" }, { "db": "NVD", "id": "CVE-2022-29791" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421300" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29791" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2546" }, { "date": "2022-05-13T15:15:09.837000", "db": "NVD", "id": "CVE-2022-29791" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421300" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29791" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2546" }, { "date": "2022-05-23T18:42:20.940000", "db": "NVD", "id": "CVE-2022-29791" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2546" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009630" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2546" } ], "trust": 0.6 } }
var-202112-0226
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system denial of service. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability is caused by a component of the product not validly validating the data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0226", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "NVD", "id": "CVE-2021-37094" } ] }, "cve": "CVE-2021-37094", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37094", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398930", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37094", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37094", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37094", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37094", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2027", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398930", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398930" }, { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "CNNVD", "id": "CNNVD-202109-2027" }, { "db": "NVD", "id": "CVE-2021-37094" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system denial of service. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability is caused by a component of the product not validly validating the data", "sources": [ { "db": "NVD", "id": "CVE-2021-37094" }, { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "VULHUB", "id": "VHN-398930" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37094", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015941", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2027", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103537", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398930", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398930" }, { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "CNNVD", "id": "CNNVD-202109-2027" }, { "db": "NVD", "id": "CVE-2021-37094" } ] }, "id": "VAR-202112-0226", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398930" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:02:55.199000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173504" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "CNNVD", "id": "CNNVD-202109-2027" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398930" }, { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "NVD", "id": "CVE-2021-37094" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37094" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398930" }, { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "CNNVD", "id": "CNNVD-202109-2027" }, { "db": "NVD", "id": "CVE-2021-37094" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398930" }, { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "CNNVD", "id": "CNNVD-202109-2027" }, { "db": "NVD", "id": "CVE-2021-37094" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398930" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2027" }, { "date": "2021-12-07T17:15:09.820000", "db": "NVD", "id": "CVE-2021-37094" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398930" }, { "date": "2022-12-05T01:26:00", "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2027" }, { "date": "2021-12-09T17:34:41.927000", "db": "NVD", "id": "CVE-2021-37094" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2027" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015941" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2027" } ], "trust": 0.6 } }
var-202206-0376
Vulnerability from variot
The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an improper permissions retention vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0376", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" } ] }, "cve": "CVE-2022-31755", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-31755", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423588", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2022-31755", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31755", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-31755", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-31755", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202206-475", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423588", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-31755", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "CNNVD", "id": "CNNVD-202206-475" }, { "db": "NVD", "id": "CVE-2022-31755" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an improper permissions retention vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31755", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011281", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-475", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66179", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423588", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31755", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "CNNVD", "id": "CNNVD-202206-475" }, { "db": "NVD", "id": "CVE-2022-31755" } ] }, "id": "VAR-202206-0376", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423588" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:21:48.535000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=195990" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2022-31755 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31755" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31755/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/281.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-31755" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "CNNVD", "id": "CNNVD-202206-475" }, { "db": "NVD", "id": "CVE-2022-31755" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "CNNVD", "id": "CNNVD-202206-475" }, { "db": "NVD", "id": "CVE-2022-31755" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423588" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31755" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-475" }, { "date": "2022-06-13T15:15:10.100000", "db": "NVD", "id": "CVE-2022-31755" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-05T00:00:00", "db": "VULHUB", "id": "VHN-423588" }, { "date": "2022-10-05T00:00:00", "db": "VULMON", "id": "CVE-2022-31755" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "date": "2022-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-475" }, { "date": "2022-10-05T14:59:00.427000", "db": "NVD", "id": "CVE-2022-31755" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-475" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product Improper Retention of Permissions Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011281" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-475" } ], "trust": 0.6 } }
var-202111-1772
Vulnerability from variot
The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS HwNearbyMain
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1772", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "NVD", "id": "CVE-2021-39983" } ] }, "cve": "CVE-2021-39983", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-39983", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401384", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-39983", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39983", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39983", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39983", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-2128", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401384", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-39983", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401384" }, { "db": "VULMON", "id": "CVE-2021-39983" }, { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "CNNVD", "id": "CNNVD-202111-2128" }, { "db": "NVD", "id": "CVE-2021-39983" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS HwNearbyMain", "sources": [ { "db": "NVD", "id": "CVE-2021-39983" }, { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "VULHUB", "id": "VHN-401384" }, { "db": "VULMON", "id": "CVE-2021-39983" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39983", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017583", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2128", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08455", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401384", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39983", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401384" }, { "db": "VULMON", "id": "CVE-2021-39983" }, { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "CNNVD", "id": "CNNVD-202111-2128" }, { "db": "NVD", "id": "CVE-2021-39983" } ] }, "id": "VAR-202111-1772", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401384" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:44:13.209000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176789" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "CNNVD", "id": "CNNVD-202111-2128" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "NVD", "id": "CVE-2021-39983" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39983" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401384" }, { "db": "VULMON", "id": "CVE-2021-39983" }, { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "CNNVD", "id": "CNNVD-202111-2128" }, { "db": "NVD", "id": "CVE-2021-39983" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401384" }, { "db": "VULMON", "id": "CVE-2021-39983" }, { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "CNNVD", "id": "CNNVD-202111-2128" }, { "db": "NVD", "id": "CVE-2021-39983" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401384" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39983" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2128" }, { "date": "2022-01-03T22:15:10.747000", "db": "NVD", "id": "CVE-2021-39983" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401384" }, { "date": "2022-01-13T00:00:00", "db": "VULMON", "id": "CVE-2021-39983" }, { "date": "2023-01-27T03:09:00", "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2128" }, { "date": "2022-01-13T17:37:31.923000", "db": "NVD", "id": "CVE-2021-39983" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2128" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017583" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2128" } ], "trust": 0.6 } }
var-202203-0971
Vulnerability from variot
There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0971", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" } ] }, "cve": "CVE-2021-40051", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40051", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401452", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40051", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40051", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40051", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40051", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202203-987", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401452", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "CNNVD", "id": "CNNVD-202203-987" }, { "db": "NVD", "id": "CVE-2021-40051" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "VULHUB", "id": "VHN-401452" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40051", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018713", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-987", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401452", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "CNNVD", "id": "CNNVD-202203-987" }, { "db": "NVD", "id": "CVE-2021-40051" } ] }, "id": "VAR-202203-0971", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401452" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:02:43.726000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=186014" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40051" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40051/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "CNNVD", "id": "CNNVD-202203-987" }, { "db": "NVD", "id": "CVE-2021-40051" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "CNNVD", "id": "CNNVD-202203-987" }, { "db": "NVD", "id": "CVE-2021-40051" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401452" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-987" }, { "date": "2022-03-10T17:43:18.447000", "db": "NVD", "id": "CVE-2021-40051" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401452" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-987" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-40051" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-987" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to resource disclosure to the wrong area in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018713" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-987" } ], "trust": 0.6 } }
var-202108-2286
Vulnerability from variot
There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration. EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2286", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" } ] }, "cve": "CVE-2021-22394", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22394", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380829", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-22394", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22394", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22394", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-22394", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202108-2828", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380829", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" }, { "db": "NVD", "id": "CVE-2021-22394" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration. EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "VULHUB", "id": "VHN-380829" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22394", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018587", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-2828", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380829", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" }, { "db": "NVD", "id": "CVE-2021-22394" } ] }, "id": "VAR-202108-2286", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380829" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:37:53.537000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202108-0000001181125881 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172031" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22394" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22394/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" }, { "db": "NVD", "id": "CVE-2021-22394" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" }, { "db": "NVD", "id": "CVE-2021-22394" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380829" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2828" }, { "date": "2022-02-25T19:15:08.927000", "db": "NVD", "id": "CVE-2021-22394" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380829" }, { "date": "2023-06-30T08:30:00", "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2828" }, { "date": "2022-03-07T17:39:01.157000", "db": "NVD", "id": "CVE-2021-22394" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2828" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018587" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2828" } ], "trust": 0.6 } }
var-202112-0945
Vulnerability from variot
The distributed data service component has a vulnerability in data access control. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0945", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "NVD", "id": "CVE-2021-40005" } ] }, "cve": "CVE-2021-40005", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40005", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-05171", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401406", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40005", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40005", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40005", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40005", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2022-05171", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202112-213", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401406", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "VULHUB", "id": "VHN-401406" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "CNNVD", "id": "CNNVD-202112-213" }, { "db": "NVD", "id": "CVE-2021-40005" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The distributed data service component has a vulnerability in data access control. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40005" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "VULHUB", "id": "VHN-401406" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40005", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017514", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05171", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-213", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401406", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "VULHUB", "id": "VHN-401406" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "CNNVD", "id": "CNNVD-202112-213" }, { "db": "NVD", "id": "CVE-2021-40005" } ] }, "id": "VAR-202112-0945", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "VULHUB", "id": "VHN-401406" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05171" } ] }, "last_update_date": "2024-08-14T14:25:06.038000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Vulnerability of improper access control in Huawei HarmonyOS Wearables", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/315091" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172737" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "CNNVD", "id": "CNNVD-202112-213" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401406" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "NVD", "id": "CVE-2021-40005" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40005" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "VULHUB", "id": "VHN-401406" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "CNNVD", "id": "CNNVD-202112-213" }, { "db": "NVD", "id": "CVE-2021-40005" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "VULHUB", "id": "VHN-401406" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "CNNVD", "id": "CNNVD-202112-213" }, { "db": "NVD", "id": "CVE-2021-40005" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05171" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401406" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-213" }, { "date": "2022-01-10T14:10:21.187000", "db": "NVD", "id": "CVE-2021-40005" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05171" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401406" }, { "date": "2023-01-24T05:24:00", "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-213" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-40005" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-213" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in leaking resources to the wrong area in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017514" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-213" } ], "trust": 0.6 } }
var-202111-0873
Vulnerability from variot
There is a Heap-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause root permission which can be escalated. Huawei Smartphones have an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0873", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "NVD", "id": "CVE-2021-37022" } ] }, "cve": "CVE-2021-37022", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2021-37022", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-398855", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37022", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37022", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37022", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37022", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202111-1889", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398855", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398855" }, { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "CNNVD", "id": "CNNVD-202111-1889" }, { "db": "NVD", "id": "CVE-2021-37022" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause root permission which can be escalated. Huawei Smartphones have an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37022" }, { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "VULHUB", "id": "VHN-398855" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37022", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015566", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1889", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102859", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398855", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398855" }, { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "CNNVD", "id": "CNNVD-202111-1889" }, { "db": "NVD", "id": "CVE-2021-37022" } ] }, "id": "VAR-202111-0873", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398855" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:31.133000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172187" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "CNNVD", "id": "CNNVD-202111-1889" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398855" }, { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "NVD", "id": "CVE-2021-37022" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37022" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398855" }, { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "CNNVD", "id": "CNNVD-202111-1889" }, { "db": "NVD", "id": "CVE-2021-37022" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398855" }, { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "CNNVD", "id": "CNNVD-202111-1889" }, { "db": "NVD", "id": "CVE-2021-37022" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398855" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1889" }, { "date": "2021-11-23T16:15:09.457000", "db": "NVD", "id": "CVE-2021-37022" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398855" }, { "date": "2022-11-24T07:11:00", "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1889" }, { "date": "2021-11-29T18:03:37.670000", "db": "NVD", "id": "CVE-2021-37022" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1889" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Write Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015566" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1889" } ], "trust": 0.6 } }
var-202103-0511
Vulnerability from variot
A component API of the HarmonyOS 2.0 has a permission bypass vulnerability. Local attackers may exploit this vulnerability to issue commands repeatedly, exhausting system service resources. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0511", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "NVD", "id": "CVE-2021-22294" } ] }, "cve": "CVE-2021-22294", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22294", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380729", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2021-22294", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22294", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22294", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2021-22294", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202103-217", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-380729", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380729" }, { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "CNNVD", "id": "CNNVD-202103-217" }, { "db": "NVD", "id": "CVE-2021-22294" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component API of the HarmonyOS 2.0 has a permission bypass vulnerability. Local attackers may exploit this vulnerability to issue commands repeatedly, exhausting system service resources. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-22294" }, { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "VULHUB", "id": "VHN-380729" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22294", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2021-003927", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202103-217", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380729", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380729" }, { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "CNNVD", "id": "CNNVD-202103-217" }, { "db": "NVD", "id": "CVE-2021-22294" } ] }, "id": "VAR-202103-0511", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380729" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:22:22.067000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://device.harmonyos.com/" }, { "title": "HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=143468" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "CNNVD", "id": "CNNVD-202103-217" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "NVD", "id": "CVE-2021-22294" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22294" }, { "trust": 0.8, "url": "https://gitee.com/openharmony/distributedschedule_samgr_lite/pulls/7/files" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380729" }, { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "CNNVD", "id": "CNNVD-202103-217" }, { "db": "NVD", "id": "CVE-2021-22294" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380729" }, { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "CNNVD", "id": "CNNVD-202103-217" }, { "db": "NVD", "id": "CVE-2021-22294" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-02T00:00:00", "db": "VULHUB", "id": "VHN-380729" }, { "date": "2021-11-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "date": "2021-03-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202103-217" }, { "date": "2021-03-02T19:15:13.083000", "db": "NVD", "id": "CVE-2021-22294" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-09T00:00:00", "db": "VULHUB", "id": "VHN-380729" }, { "date": "2021-11-10T06:38:00", "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "date": "2021-03-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202103-217" }, { "date": "2021-03-09T14:18:35.027000", "db": "NVD", "id": "CVE-2021-22294" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202103-217" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003927" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202103-217" } ], "trust": 0.6 } }
var-202111-1781
Vulnerability from variot
The HwNearbyMain module has a Improper Validation of Array Index vulnerability.Successful exploitation of this vulnerability may cause a process to restart. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1781", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "NVD", "id": "CVE-2021-39985" } ] }, "cve": "CVE-2021-39985", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-39985", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401386", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-39985", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39985", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39985", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39985", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-2125", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401386", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401386" }, { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "CNNVD", "id": "CNNVD-202111-2125" }, { "db": "NVD", "id": "CVE-2021-39985" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwNearbyMain module has a Improper Validation of Array Index vulnerability.Successful exploitation of this vulnerability may cause a process to restart. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-39985" }, { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "VULHUB", "id": "VHN-401386" }, { "db": "VULMON", "id": "CVE-2021-39985" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39985", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017728", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2125", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08313", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401386", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39985", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401386" }, { "db": "VULMON", "id": "CVE-2021-39985" }, { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "CNNVD", "id": "CNNVD-202111-2125" }, { "db": "NVD", "id": "CVE-2021-39985" } ] }, "id": "VAR-202111-1781", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401386" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:50:03.743000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176786" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "CNNVD", "id": "CNNVD-202111-2125" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-129", "trust": 1.1 }, { "problemtype": "Improper validation of array indexes (CWE-129) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401386" }, { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "NVD", "id": "CVE-2021-39985" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39985" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401386" }, { "db": "VULMON", "id": "CVE-2021-39985" }, { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "CNNVD", "id": "CNNVD-202111-2125" }, { "db": "NVD", "id": "CVE-2021-39985" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401386" }, { "db": "VULMON", "id": "CVE-2021-39985" }, { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "CNNVD", "id": "CNNVD-202111-2125" }, { "db": "NVD", "id": "CVE-2021-39985" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401386" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39985" }, { "date": "2023-02-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2125" }, { "date": "2022-01-03T22:15:10.843000", "db": "NVD", "id": "CVE-2021-39985" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-14T00:00:00", "db": "VULHUB", "id": "VHN-401386" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39985" }, { "date": "2023-02-02T02:33:00", "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2125" }, { "date": "2022-01-14T15:32:12.377000", "db": "NVD", "id": "CVE-2021-39985" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2125" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in array index validation in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017728" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2125" } ], "trust": 0.6 } }
var-202208-0811
Vulnerability from variot
The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0811", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" } ] }, "cve": "CVE-2022-37003", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-37003", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-37003", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-37003", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-37003", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202208-2397", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" }, { "db": "NVD", "id": "CVE-2022-37003" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37003", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014553", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2397", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427496", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37003", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" }, { "db": "NVD", "id": "CVE-2022-37003" } ] }, "id": "VAR-202208-0811", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427496" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:14.296000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=204367" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37003" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37003/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" }, { "db": "NVD", "id": "CVE-2022-37003" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" }, { "db": "NVD", "id": "CVE-2022-37003" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427496" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37003" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2397" }, { "date": "2022-08-10T20:16:04.073000", "db": "NVD", "id": "CVE-2022-37003" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427496" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37003" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2397" }, { "date": "2022-08-15T18:02:06.477000", "db": "NVD", "id": "CVE-2022-37003" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2397" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014553" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2397" } ], "trust": 0.6 } }
var-202112-0262
Vulnerability from variot
There is a Encoding timing vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of service. Huawei A race condition vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0262", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "NVD", "id": "CVE-2021-37085" } ] }, "cve": "CVE-2021-37085", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2021-37085", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-398920", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "id": "CVE-2021-37085", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37085", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37085", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-37085", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202109-2024", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398920", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398920" }, { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "CNNVD", "id": "CNNVD-202109-2024" }, { "db": "NVD", "id": "CVE-2021-37085" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Encoding timing vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of service. Huawei A race condition vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37085" }, { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "VULHUB", "id": "VHN-398920" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37085", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016021", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2024", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-01675", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398920", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398920" }, { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "CNNVD", "id": "CNNVD-202109-2024" }, { "db": "NVD", "id": "CVE-2021-37085" } ] }, "id": "VAR-202112-0262", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398920" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:22:02.810000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173790" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "CNNVD", "id": "CNNVD-202109-2024" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398920" }, { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "NVD", "id": "CVE-2021-37085" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37085" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398920" }, { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "CNNVD", "id": "CNNVD-202109-2024" }, { "db": "NVD", "id": "CVE-2021-37085" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398920" }, { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "CNNVD", "id": "CNNVD-202109-2024" }, { "db": "NVD", "id": "CVE-2021-37085" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398920" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2024" }, { "date": "2021-12-07T17:15:09.523000", "db": "NVD", "id": "CVE-2021-37085" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398920" }, { "date": "2022-12-05T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "date": "2021-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2024" }, { "date": "2021-12-09T15:34:52.777000", "db": "NVD", "id": "CVE-2021-37085" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2024" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Race Condition Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016021" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2024" } ], "trust": 0.6 } }
var-202210-0209
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0209", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "NVD", "id": "CVE-2022-41597" } ] }, "cve": "CVE-2022-41597", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "id": "CVE-2022-41597", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41597", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41597", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2022-41597", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202210-154", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "CNNVD", "id": "CNNVD-202210-154" }, { "db": "NVD", "id": "CVE-2022-41597" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41597" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "VULHUB", "id": "VHN-437838" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41597", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018790", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-154", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437838", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437838" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "CNNVD", "id": "CNNVD-202210-154" }, { "db": "NVD", "id": "CVE-2022-41597" } ] }, "id": "VAR-202210-0209", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437838" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:14.621000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210788" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437838" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "NVD", "id": "CVE-2022-41597" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41597" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41597/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437838" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "CNNVD", "id": "CNNVD-202210-154" }, { "db": "NVD", "id": "CVE-2022-41597" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437838" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "CNNVD", "id": "CNNVD-202210-154" }, { "db": "NVD", "id": "CVE-2022-41597" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437838" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-154" }, { "date": "2022-10-14T16:15:28.067000", "db": "NVD", "id": "CVE-2022-41597" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437838" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-154" }, { "date": "2022-10-15T01:55:30.273000", "db": "NVD", "id": "CVE-2022-41597" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-154" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018790" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-154" } ], "trust": 0.6 } }
var-202112-0224
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to user privacy disclosed. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There are security vulnerabilities in Huawei HarmonyOS, which can be exploited by attackers to leak user privacy
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0224", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "NVD", "id": "CVE-2021-37096" } ] }, "cve": "CVE-2021-37096", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37096", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398932", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37096", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37096", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37096", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37096", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2055", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398932", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398932" }, { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "CNNVD", "id": "CNNVD-202109-2055" }, { "db": "NVD", "id": "CVE-2021-37096" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to user privacy disclosed. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There are security vulnerabilities in Huawei HarmonyOS, which can be exploited by attackers to leak user privacy", "sources": [ { "db": "NVD", "id": "CVE-2021-37096" }, { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "VULHUB", "id": "VHN-398932" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37096", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015894", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2055", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103535", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398932", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398932" }, { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "CNNVD", "id": "CNNVD-202109-2055" }, { "db": "NVD", "id": "CVE-2021-37096" } ] }, "id": "VAR-202112-0224", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398932" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:44.300000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173524" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "CNNVD", "id": "CNNVD-202109-2055" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398932" }, { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "NVD", "id": "CVE-2021-37096" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37096" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398932" }, { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "CNNVD", "id": "CNNVD-202109-2055" }, { "db": "NVD", "id": "CVE-2021-37096" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398932" }, { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "CNNVD", "id": "CNNVD-202109-2055" }, { "db": "NVD", "id": "CVE-2021-37096" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398932" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2055" }, { "date": "2021-12-07T17:15:09.897000", "db": "NVD", "id": "CVE-2021-37096" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398932" }, { "date": "2022-12-01T08:20:00", "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2055" }, { "date": "2021-12-09T17:33:27.780000", "db": "NVD", "id": "CVE-2021-37096" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2055" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015894" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2055" } ], "trust": 0.6 } }
var-202209-0368
Vulnerability from variot
The HwChrService module has a vulnerability in permission control. Successful exploitation of this vulnerability may cause disclosure of user network information. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0368", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "NVD", "id": "CVE-2022-39010" } ] }, "cve": "CVE-2022-39010", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-39010", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39010", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-39010", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-39010", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-158", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "CNNVD", "id": "CNNVD-202209-158" }, { "db": "NVD", "id": "CVE-2022-39010" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwChrService module has a vulnerability in permission control. Successful exploitation of this vulnerability may cause disclosure of user network information. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-39010" }, { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "VULHUB", "id": "VHN-434778" }, { "db": "VULMON", "id": "CVE-2022-39010" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39010", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017584", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-158", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434778", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39010", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434778" }, { "db": "VULMON", "id": "CVE-2022-39010" }, { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "CNNVD", "id": "CNNVD-202209-158" }, { "db": "NVD", "id": "CVE-2022-39010" } ] }, "id": "VAR-202209-0368", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434778" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:37:26.968000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=208075" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "NVD", "id": "CVE-2022-39010" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39010" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39010/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434778" }, { "db": "VULMON", "id": "CVE-2022-39010" }, { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "CNNVD", "id": "CNNVD-202209-158" }, { "db": "NVD", "id": "CVE-2022-39010" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434778" }, { "db": "VULMON", "id": "CVE-2022-39010" }, { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "CNNVD", "id": "CNNVD-202209-158" }, { "db": "NVD", "id": "CVE-2022-39010" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434778" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39010" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-158" }, { "date": "2022-09-16T18:15:18.287000", "db": "NVD", "id": "CVE-2022-39010" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434778" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39010" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-158" }, { "date": "2022-09-21T14:04:30.277000", "db": "NVD", "id": "CVE-2022-39010" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-158" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017584" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-158" } ], "trust": 0.6 } }
var-202208-0488
Vulnerability from variot
The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability in inserting or modifying arguments.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0488", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" } ] }, "cve": "CVE-2022-37005", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-37005", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-37005", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-37005", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-37005", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202208-2396", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" }, { "db": "NVD", "id": "CVE-2022-37005" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability in inserting or modifying arguments.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37005", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014551", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2396", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427497", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37005", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" }, { "db": "NVD", "id": "CVE-2022-37005" } ] }, "id": "VAR-202208-0488", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427497" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:21:53.357000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Repair measures for parameter injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=204366" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-88", "trust": 1.1 }, { "problemtype": "Insert or change arguments (CWE-88) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37005" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37005/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" }, { "db": "NVD", "id": "CVE-2022-37005" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" }, { "db": "NVD", "id": "CVE-2022-37005" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427497" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37005" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2396" }, { "date": "2022-08-10T20:16:04.443000", "db": "NVD", "id": "CVE-2022-37005" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427497" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37005" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2396" }, { "date": "2022-08-15T18:00:07.387000", "db": "NVD", "id": "CVE-2022-37005" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2396" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Argument insertion or modification vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014551" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "parameter injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2396" } ], "trust": 0.6 } }
var-202111-0852
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0852", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "NVD", "id": "CVE-2021-37008" } ] }, "cve": "CVE-2021-37008", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37008", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398839", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37008", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37008", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37008", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37008", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1878", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398839", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398839" }, { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "CNNVD", "id": "CNNVD-202111-1878" }, { "db": "NVD", "id": "CVE-2021-37008" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37008" }, { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "VULHUB", "id": "VHN-398839" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37008", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015639", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1878", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398839", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398839" }, { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "CNNVD", "id": "CNNVD-202111-1878" }, { "db": "NVD", "id": "CVE-2021-37008" } ] }, "id": "VAR-202111-0852", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398839" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:31.158000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172177" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "CNNVD", "id": "CNNVD-202111-1878" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398839" }, { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "NVD", "id": "CVE-2021-37008" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37008" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398839" }, { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "CNNVD", "id": "CNNVD-202111-1878" }, { "db": "NVD", "id": "CVE-2021-37008" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398839" }, { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "CNNVD", "id": "CNNVD-202111-1878" }, { "db": "NVD", "id": "CVE-2021-37008" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398839" }, { "date": "2022-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1878" }, { "date": "2021-11-23T16:15:09.023000", "db": "NVD", "id": "CVE-2021-37008" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398839" }, { "date": "2022-11-28T05:16:00", "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1878" }, { "date": "2021-11-29T15:34:57.450000", "db": "NVD", "id": "CVE-2021-37008" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1878" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015639" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1878" } ], "trust": 0.6 } }
var-202302-0315
Vulnerability from variot
The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0315", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "NVD", "id": "CVE-2022-48299" } ] }, "cve": "CVE-2022-48299", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-48299", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48299", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-48299", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-48299", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202302-344", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "CNNVD", "id": "CNNVD-202302-344" }, { "db": "NVD", "id": "CVE-2022-48299" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48299" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "VULHUB", "id": "VHN-453379" }, { "db": "VULMON", "id": "CVE-2022-48299" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48299", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003404", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-344", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453379", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48299", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453379" }, { "db": "VULMON", "id": "CVE-2022-48299" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "CNNVD", "id": "CNNVD-202302-344" }, { "db": "NVD", "id": "CVE-2022-48299" } ] }, "id": "VAR-202302-0315", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453379" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:05:54.652000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=225745" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453379" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "NVD", "id": "CVE-2022-48299" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48299" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48299/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453379" }, { "db": "VULMON", "id": "CVE-2022-48299" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "CNNVD", "id": "CNNVD-202302-344" }, { "db": "NVD", "id": "CVE-2022-48299" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453379" }, { "db": "VULMON", "id": "CVE-2022-48299" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "CNNVD", "id": "CNNVD-202302-344" }, { "db": "NVD", "id": "CVE-2022-48299" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453379" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48299" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-344" }, { "date": "2023-02-09T17:15:14.853000", "db": "NVD", "id": "CVE-2022-48299" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453379" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48299" }, { "date": "2023-09-07T03:10:00", "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-344" }, { "date": "2023-02-16T19:32:59.147000", "db": "NVD", "id": "CVE-2022-48299" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-344" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003404" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-344" } ], "trust": 0.6 } }
var-202210-0347
Vulnerability from variot
The BT Hfp Client module has a Use-After-Free (UAF) vulnerability.Successful exploitation of this vulnerability may result in arbitrary code execution
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0347", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38983" } ] }, "cve": "CVE-2022-38983", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38983", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38983", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-171", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-171" }, { "db": "NVD", "id": "CVE-2022-38983" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The BT Hfp Client module has a Use-After-Free (UAF) vulnerability.Successful exploitation of this vulnerability may result in arbitrary code execution", "sources": [ { "db": "NVD", "id": "CVE-2022-38983" }, { "db": "VULHUB", "id": "VHN-434762" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38983", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-171", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434762", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434762" }, { "db": "CNNVD", "id": "CNNVD-202210-171" }, { "db": "NVD", "id": "CVE-2022-38983" } ] }, "id": "VAR-202210-0347", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434762" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:21:35.846000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=211153" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434762" }, { "db": "NVD", "id": "CVE-2022-38983" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38983/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434762" }, { "db": "CNNVD", "id": "CNNVD-202210-171" }, { "db": "NVD", "id": "CVE-2022-38983" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434762" }, { "db": "CNNVD", "id": "CNNVD-202210-171" }, { "db": "NVD", "id": "CVE-2022-38983" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434762" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-171" }, { "date": "2022-10-14T16:15:14.843000", "db": "NVD", "id": "CVE-2022-38983" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434762" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-171" }, { "date": "2022-10-18T13:21:24.750000", "db": "NVD", "id": "CVE-2022-38983" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-171" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Resource Management Error Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-171" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-171" } ], "trust": 0.6 } }
var-202201-1717
Vulnerability from variot
The eID module has a null pointer reference vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. A resource management error vulnerability exists in Huawei HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1717", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "NVD", "id": "CVE-2021-40018" } ] }, "cve": "CVE-2021-40018", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40018", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401419", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40018", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40018", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40018", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40018", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202201-289", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401419", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401419" }, { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "CNNVD", "id": "CNNVD-202201-289" }, { "db": "NVD", "id": "CVE-2021-40018" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The eID module has a null pointer reference vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. A resource management error vulnerability exists in Huawei HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-40018" }, { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "VULHUB", "id": "VHN-401419" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40018", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002889", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-289", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401419", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401419" }, { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "CNNVD", "id": "CNNVD-202201-289" }, { "db": "NVD", "id": "CVE-2021-40018" } ] }, "id": "VAR-202201-1717", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401419" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:24:59.670000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=178001" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "CNNVD", "id": "CNNVD-202201-289" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401419" }, { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "NVD", "id": "CVE-2021-40018" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40018" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401419" }, { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "CNNVD", "id": "CNNVD-202201-289" }, { "db": "NVD", "id": "CVE-2021-40018" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401419" }, { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "CNNVD", "id": "CNNVD-202201-289" }, { "db": "NVD", "id": "CVE-2021-40018" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401419" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-289" }, { "date": "2022-01-10T14:10:21.510000", "db": "NVD", "id": "CVE-2021-40018" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401419" }, { "date": "2023-01-24T03:25:00", "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-289" }, { "date": "2022-01-13T03:09:44.180000", "db": "NVD", "id": "CVE-2021-40018" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-289" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002889" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-289" } ], "trust": 0.6 } }
var-202210-0414
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0414", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "NVD", "id": "CVE-2022-41602" } ] }, "cve": "CVE-2022-41602", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "id": "CVE-2022-41602", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41602", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41602", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2022-41602", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202210-150", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "CNNVD", "id": "CNNVD-202210-150" }, { "db": "NVD", "id": "CVE-2022-41602" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41602" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "VULHUB", "id": "VHN-437850" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41602", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018786", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-150", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437850", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437850" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "CNNVD", "id": "CNNVD-202210-150" }, { "db": "NVD", "id": "CVE-2022-41602" } ] }, "id": "VAR-202210-0414", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437850" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:49:32.916000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210784" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437850" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "NVD", "id": "CVE-2022-41602" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41602" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41602/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437850" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "CNNVD", "id": "CNNVD-202210-150" }, { "db": "NVD", "id": "CVE-2022-41602" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437850" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "CNNVD", "id": "CNNVD-202210-150" }, { "db": "NVD", "id": "CVE-2022-41602" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437850" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-150" }, { "date": "2022-10-14T16:15:29.810000", "db": "NVD", "id": "CVE-2022-41602" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437850" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-150" }, { "date": "2022-10-15T01:57:57.243000", "db": "NVD", "id": "CVE-2022-41602" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-150" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018786" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-150" } ], "trust": 0.6 } }
var-202112-0255
Vulnerability from variot
There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user's nickname is maliciously tampered with. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0255", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "NVD", "id": "CVE-2021-37058" } ] }, "cve": "CVE-2021-37058", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37058", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398891", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37058", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37058", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37058", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-37058", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202109-2016", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398891", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398891" }, { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "CNNVD", "id": "CNNVD-202109-2016" }, { "db": "NVD", "id": "CVE-2021-37058" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user\u0027s nickname is maliciously tampered with. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-37058" }, { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "VULHUB", "id": "VHN-398891" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37058", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016048", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2016", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398891", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398891" }, { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "CNNVD", "id": "CNNVD-202109-2016" }, { "db": "NVD", "id": "CVE-2021-37058" } ] }, "id": "VAR-202112-0255", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398891" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:44:12.913000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173495" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "CNNVD", "id": "CNNVD-202109-2016" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-732", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398891" }, { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "NVD", "id": "CVE-2021-37058" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37058" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398891" }, { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "CNNVD", "id": "CNNVD-202109-2016" }, { "db": "NVD", "id": "CVE-2021-37058" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398891" }, { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "CNNVD", "id": "CNNVD-202109-2016" }, { "db": "NVD", "id": "CVE-2021-37058" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398891" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2016" }, { "date": "2021-12-07T17:15:08.507000", "db": "NVD", "id": "CVE-2021-37058" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398891" }, { "date": "2022-12-05T07:41:00", "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2016" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37058" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2016" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016048" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2016" } ], "trust": 0.6 } }
var-202112-0947
Vulnerability from variot
The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end. HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0947", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "NVD", "id": "CVE-2021-40002" } ] }, "cve": "CVE-2021-40002", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CVE-2021-40002", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CNVD-2022-05173", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "VHN-401403", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-40002", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40002", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40002", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40002", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2022-05173", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202112-211", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401403", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "VULHUB", "id": "VHN-401403" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "CNNVD", "id": "CNNVD-202112-211" }, { "db": "NVD", "id": "CVE-2021-40002" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end. HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40002" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "VULHUB", "id": "VHN-401403" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40002", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017520", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05173", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-211", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401403", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "VULHUB", "id": "VHN-401403" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "CNNVD", "id": "CNNVD-202112-211" }, { "db": "NVD", "id": "CVE-2021-40002" } ] }, "id": "VAR-202112-0947", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "VULHUB", "id": "VHN-401403" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05173" } ] }, "last_update_date": "2024-08-14T13:43:07.683000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Huawei HarmonyOS Wearables Out-of-bounds Write Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/315071" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172735" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "CNNVD", "id": "CNNVD-202112-211" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401403" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "NVD", "id": "CVE-2021-40002" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40002" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "VULHUB", "id": "VHN-401403" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "CNNVD", "id": "CNNVD-202112-211" }, { "db": "NVD", "id": "CVE-2021-40002" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "VULHUB", "id": "VHN-401403" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "CNNVD", "id": "CNNVD-202112-211" }, { "db": "NVD", "id": "CVE-2021-40002" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05173" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401403" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-211" }, { "date": "2022-01-10T14:10:21.047000", "db": "NVD", "id": "CVE-2021-40002" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05173" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401403" }, { "date": "2023-01-24T05:52:00", "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-211" }, { "date": "2022-01-13T16:02:49.427000", "db": "NVD", "id": "CVE-2021-40002" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-211" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017520" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-211" } ], "trust": 0.6 } }
var-202110-1858
Vulnerability from variot
HwPCAssistant has a Path Traversal vulnerability .Successful exploitation of this vulnerability may write any file. HarmonyOS Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1858", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "NVD", "id": "CVE-2021-37128" } ] }, "cve": "CVE-2021-37128", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37128", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398965", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37128", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37128", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37128", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37128", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202110-2223", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398965", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398965" }, { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "CNNVD", "id": "CNNVD-202110-2223" }, { "db": "NVD", "id": "CVE-2021-37128" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HwPCAssistant has a Path Traversal vulnerability .Successful exploitation of this vulnerability may write any file. HarmonyOS Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-37128" }, { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "VULHUB", "id": "VHN-398965" }, { "db": "VULMON", "id": "CVE-2021-37128" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37128", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017297", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2223", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08316", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398965", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37128", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398965" }, { "db": "VULMON", "id": "CVE-2021-37128" }, { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "CNNVD", "id": "CNNVD-202110-2223" }, { "db": "NVD", "id": "CVE-2021-37128" } ] }, "id": "VAR-202110-1858", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398965" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:38.821000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176771" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "CNNVD", "id": "CNNVD-202110-2223" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398965" }, { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "NVD", "id": "CVE-2021-37128" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37128" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398965" }, { "db": "VULMON", "id": "CVE-2021-37128" }, { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "CNNVD", "id": "CNNVD-202110-2223" }, { "db": "NVD", "id": "CVE-2021-37128" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398965" }, { "db": "VULMON", "id": "CVE-2021-37128" }, { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "CNNVD", "id": "CNNVD-202110-2223" }, { "db": "NVD", "id": "CVE-2021-37128" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398965" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37128" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2223" }, { "date": "2022-01-03T22:15:09.690000", "db": "NVD", "id": "CVE-2021-37128" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398965" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37128" }, { "date": "2023-01-13T05:46:00", "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2223" }, { "date": "2022-01-11T20:05:38.820000", "db": "NVD", "id": "CVE-2021-37128" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2223" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017297" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2223" } ], "trust": 0.6 } }
var-202212-0612
Vulnerability from variot
Fingerprint calibration has a vulnerability of lacking boundary judgment. Successful exploitation of this vulnerability may cause out-of-bounds write. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0612", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "NVD", "id": "CVE-2022-46319" } ] }, "cve": "CVE-2022-46319", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-46319", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46319", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-46319", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-46319", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202212-2497", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "CNNVD", "id": "CNNVD-202212-2497" }, { "db": "NVD", "id": "CVE-2022-46319" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Fingerprint calibration has a vulnerability of lacking boundary judgment. Successful exploitation of this vulnerability may cause out-of-bounds write. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46319" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "VULHUB", "id": "VHN-444289" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46319", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024012", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2497", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444289", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444289" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "CNNVD", "id": "CNNVD-202212-2497" }, { "db": "NVD", "id": "CVE-2022-46319" } ] }, "id": "VAR-202212-0612", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444289" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:21:28.850000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218952" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444289" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "NVD", "id": "CVE-2022-46319" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46319" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46319/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444289" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "CNNVD", "id": "CNNVD-202212-2497" }, { "db": "NVD", "id": "CVE-2022-46319" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444289" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "CNNVD", "id": "CNNVD-202212-2497" }, { "db": "NVD", "id": "CVE-2022-46319" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444289" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2497" }, { "date": "2022-12-20T21:15:11.597000", "db": "NVD", "id": "CVE-2022-46319" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444289" }, { "date": "2023-12-01T02:32:00", "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2497" }, { "date": "2022-12-24T04:15:59.840000", "db": "NVD", "id": "CVE-2022-46319" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2497" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024012" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2497" } ], "trust": 0.6 } }
var-202110-1857
Vulnerability from variot
Location-related APIs exists a Race Condition vulnerability.Successful exploitation of this vulnerability may use Higher Permissions for invoking the interface of location-related components. HarmonyOS There is a race condition vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1857", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "NVD", "id": "CVE-2021-37134" } ] }, "cve": "CVE-2021-37134", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-37134", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-398970", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2021-37134", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37134", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37134", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37134", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2224", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398970", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398970" }, { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "CNNVD", "id": "CNNVD-202110-2224" }, { "db": "NVD", "id": "CVE-2021-37134" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Location-related APIs exists a Race Condition vulnerability.Successful exploitation of this vulnerability may use Higher Permissions for invoking the interface of location-related components. HarmonyOS There is a race condition vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37134" }, { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "VULHUB", "id": "VHN-398970" }, { "db": "VULMON", "id": "CVE-2021-37134" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37134", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017617", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2224", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-14784", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398970", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37134", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398970" }, { "db": "VULMON", "id": "CVE-2021-37134" }, { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "CNNVD", "id": "CNNVD-202110-2224" }, { "db": "NVD", "id": "CVE-2021-37134" } ] }, "id": "VAR-202110-1857", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398970" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:53:51.515000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176772" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "CNNVD", "id": "CNNVD-202110-2224" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398970" }, { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "NVD", "id": "CVE-2021-37134" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37134" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398970" }, { "db": "VULMON", "id": "CVE-2021-37134" }, { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "CNNVD", "id": "CNNVD-202110-2224" }, { "db": "NVD", "id": "CVE-2021-37134" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398970" }, { "db": "VULMON", "id": "CVE-2021-37134" }, { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "CNNVD", "id": "CNNVD-202110-2224" }, { "db": "NVD", "id": "CVE-2021-37134" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398970" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37134" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2224" }, { "date": "2022-01-03T22:15:09.857000", "db": "NVD", "id": "CVE-2021-37134" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-398970" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37134" }, { "date": "2023-01-27T07:36:00", "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2224" }, { "date": "2022-01-13T16:18:19.047000", "db": "NVD", "id": "CVE-2021-37134" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2224" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Race condition vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017617" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2224" } ], "trust": 0.6 } }
var-202201-1023
Vulnerability from variot
The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1023", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "NVD", "id": "CVE-2021-40022" } ] }, "cve": "CVE-2021-40022", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40022", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401423", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40022", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40022", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40022", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40022", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202201-302", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401423", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401423" }, { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "CNNVD", "id": "CNNVD-202201-302" }, { "db": "NVD", "id": "CVE-2021-40022" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40022" }, { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "VULHUB", "id": "VHN-401423" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40022", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002901", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-302", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-08459", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401423", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401423" }, { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "CNNVD", "id": "CNNVD-202201-302" }, { "db": "NVD", "id": "CVE-2021-40022" } ] }, "id": "VAR-202201-1023", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401423" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:06:34.338000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=178004" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "CNNVD", "id": "CNNVD-202201-302" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "NVD", "id": "CVE-2021-40022" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40022" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401423" }, { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "CNNVD", "id": "CNNVD-202201-302" }, { "db": "NVD", "id": "CVE-2021-40022" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401423" }, { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "CNNVD", "id": "CNNVD-202201-302" }, { "db": "NVD", "id": "CVE-2021-40022" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401423" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-302" }, { "date": "2022-01-10T14:10:21.653000", "db": "NVD", "id": "CVE-2021-40022" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401423" }, { "date": "2023-01-25T08:50:00", "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-302" }, { "date": "2022-01-13T03:17:45.520000", "db": "NVD", "id": "CVE-2021-40022" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-302" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002901" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-302" } ], "trust": 0.6 } }
var-202111-0851
Vulnerability from variot
There is a Configuration vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0851", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "NVD", "id": "CVE-2021-37009" } ] }, "cve": "CVE-2021-37009", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37009", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398840", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37009", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37009", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37009", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37009", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1879", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398840", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398840" }, { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "CNNVD", "id": "CNNVD-202111-1879" }, { "db": "NVD", "id": "CVE-2021-37009" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Configuration vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37009" }, { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "VULHUB", "id": "VHN-398840" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37009", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015590", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1879", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102858", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398840", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398840" }, { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "CNNVD", "id": "CNNVD-202111-1879" }, { "db": "NVD", "id": "CVE-2021-37009" } ] }, "id": "VAR-202111-0851", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398840" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:42:42.364000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172178" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "CNNVD", "id": "CNNVD-202111-1879" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "NVD", "id": "CVE-2021-37009" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37009" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398840" }, { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "CNNVD", "id": "CNNVD-202111-1879" }, { "db": "NVD", "id": "CVE-2021-37009" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398840" }, { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "CNNVD", "id": "CNNVD-202111-1879" }, { "db": "NVD", "id": "CVE-2021-37009" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398840" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1879" }, { "date": "2021-11-23T16:15:09.067000", "db": "NVD", "id": "CVE-2021-37009" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398840" }, { "date": "2022-11-24T09:15:00", "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1879" }, { "date": "2021-11-29T15:51:02.507000", "db": "NVD", "id": "CVE-2021-37009" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1879" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015590" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1879" } ], "trust": 0.6 } }
var-202209-0226
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0226", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" } ] }, "cve": "CVE-2022-38978", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-38978", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38978", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38978", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-38978", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202209-187", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "CNNVD", "id": "CNNVD-202209-187" }, { "db": "NVD", "id": "CVE-2022-38978" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "VULHUB", "id": "VHN-428505" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38978", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016794", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-187", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428505", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428505" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "CNNVD", "id": "CNNVD-202209-187" }, { "db": "NVD", "id": "CVE-2022-38978" } ] }, "id": "VAR-202209-0226", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428505" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:10:35.099000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=208088" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38978" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38978/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428505" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "CNNVD", "id": "CNNVD-202209-187" }, { "db": "NVD", "id": "CVE-2022-38978" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428505" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "CNNVD", "id": "CNNVD-202209-187" }, { "db": "NVD", "id": "CVE-2022-38978" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428505" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-187" }, { "date": "2022-09-16T18:15:17.350000", "db": "NVD", "id": "CVE-2022-38978" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428505" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-187" }, { "date": "2022-09-17T03:46:58.527000", "db": "NVD", "id": "CVE-2022-38978" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-187" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-187" } ], "trust": 0.6 } }
var-202112-0259
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0259", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "NVD", "id": "CVE-2021-37011" } ] }, "cve": "CVE-2021-37011", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.4, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2021-37011", "impactScore": 9.2, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.4, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-398843", "impactScore": 9.2, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37011", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37011", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37011", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37011", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2061", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398843", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398843" }, { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "CNNVD", "id": "CNNVD-202109-2061" }, { "db": "NVD", "id": "CVE-2021-37011" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37011" }, { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "VULHUB", "id": "VHN-398843" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37011", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015762", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2061", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398843", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398843" }, { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "CNNVD", "id": "CNNVD-202109-2061" }, { "db": "NVD", "id": "CVE-2021-37011" } ] }, "id": "VAR-202112-0259", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398843" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:11:10.183000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173237" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "CNNVD", "id": "CNNVD-202109-2061" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398843" }, { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "NVD", "id": "CVE-2021-37011" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37011" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398843" }, { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "CNNVD", "id": "CNNVD-202109-2061" }, { "db": "NVD", "id": "CVE-2021-37011" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398843" }, { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "CNNVD", "id": "CNNVD-202109-2061" }, { "db": "NVD", "id": "CVE-2021-37011" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398843" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2061" }, { "date": "2021-12-07T17:15:08.213000", "db": "NVD", "id": "CVE-2021-37011" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398843" }, { "date": "2022-11-30T01:51:00", "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2061" }, { "date": "2021-12-09T17:50:00.057000", "db": "NVD", "id": "CVE-2021-37011" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2061" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-bounds write vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015762" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2061" } ], "trust": 0.6 } }
var-202201-1068
Vulnerability from variot
The bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to compromise confidentiality. No detailed vulnerability details are currently available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1068", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "NVD", "id": "CVE-2021-40032" } ] }, "cve": "CVE-2021-40032", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40032", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401433", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-40032", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40032", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40032", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-40032", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202201-272", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401433", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401433" }, { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "CNNVD", "id": "CNNVD-202201-272" }, { "db": "NVD", "id": "CVE-2021-40032" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to compromise confidentiality. No detailed vulnerability details are currently available", "sources": [ { "db": "NVD", "id": "CVE-2021-40032" }, { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "VULHUB", "id": "VHN-401433" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40032", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002895", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-272", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08451", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401433", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401433" }, { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "CNNVD", "id": "CNNVD-202201-272" }, { "db": "NVD", "id": "CVE-2021-40032" } ] }, "id": "VAR-202201-1068", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401433" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:32:54.700000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=177992" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "CNNVD", "id": "CNNVD-202201-272" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "NVD", "id": "CVE-2021-40032" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.6, "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "trust": 1.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40032" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202307-0000001587168858" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401433" }, { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "CNNVD", "id": "CNNVD-202201-272" }, { "db": "NVD", "id": "CVE-2021-40032" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401433" }, { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "CNNVD", "id": "CNNVD-202201-272" }, { "db": "NVD", "id": "CVE-2021-40032" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401433" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-272" }, { "date": "2022-01-10T14:10:22.200000", "db": "NVD", "id": "CVE-2021-40032" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401433" }, { "date": "2023-01-25T07:36:00", "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "date": "2023-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-272" }, { "date": "2023-07-06T14:15:10.450000", "db": "NVD", "id": "CVE-2021-40032" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-272" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002895" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-272" } ], "trust": 0.6 } }
var-202205-0302
Vulnerability from variot
The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0302", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "NVD", "id": "CVE-2022-29795" } ] }, "cve": "CVE-2022-29795", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-29795", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421304", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-29795", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29795", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29795", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-29795", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202205-2553", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421304", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "CNNVD", "id": "CNNVD-202205-2553" }, { "db": "NVD", "id": "CVE-2022-29795" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-29795" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "VULHUB", "id": "VHN-421304" }, { "db": "VULMON", "id": "CVE-2022-29795" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29795", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009626", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2553", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-47651", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421304", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29795", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "VULMON", "id": "CVE-2022-29795" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "CNNVD", "id": "CNNVD-202205-2553" }, { "db": "NVD", "id": "CVE-2022-29795" } ] }, "id": "VAR-202205-0302", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421304" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:01:03.235000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193774" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "NVD", "id": "CVE-2022-29795" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29795" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29795/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "VULMON", "id": "CVE-2022-29795" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "CNNVD", "id": "CNNVD-202205-2553" }, { "db": "NVD", "id": "CVE-2022-29795" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "VULMON", "id": "CVE-2022-29795" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "CNNVD", "id": "CNNVD-202205-2553" }, { "db": "NVD", "id": "CVE-2022-29795" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421304" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29795" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2553" }, { "date": "2022-05-13T15:15:10.033000", "db": "NVD", "id": "CVE-2022-29795" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421304" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29795" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2553" }, { "date": "2022-05-23T18:39:58.577000", "db": "NVD", "id": "CVE-2022-29795" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2553" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009626" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2553" } ], "trust": 0.6 } }
var-202111-0877
Vulnerability from variot
There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones contain a permission impropriety retention vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a permission configuration vulnerability in Huawei HarmonyOS. Attackers can exploit this vulnerability to affect user privacy
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0877", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "NVD", "id": "CVE-2021-37006" } ] }, "cve": "CVE-2021-37006", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37006", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398837", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37006", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37006", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37006", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37006", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-1875", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398837", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398837" }, { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "CNNVD", "id": "CNNVD-202111-1875" }, { "db": "NVD", "id": "CVE-2021-37006" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones contain a permission impropriety retention vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a permission configuration vulnerability in Huawei HarmonyOS. Attackers can exploit this vulnerability to affect user privacy", "sources": [ { "db": "NVD", "id": "CVE-2021-37006" }, { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "VULHUB", "id": "VHN-398837" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37006", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015637", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1875", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102857", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398837", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398837" }, { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "CNNVD", "id": "CNNVD-202111-1875" }, { "db": "NVD", "id": "CVE-2021-37006" } ] }, "id": "VAR-202111-0877", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398837" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:43:14.307000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172174" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "CNNVD", "id": "CNNVD-202111-1875" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398837" }, { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "NVD", "id": "CVE-2021-37006" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37006" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398837" }, { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "CNNVD", "id": "CNNVD-202111-1875" }, { "db": "NVD", "id": "CVE-2021-37006" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398837" }, { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "CNNVD", "id": "CNNVD-202111-1875" }, { "db": "NVD", "id": "CVE-2021-37006" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398837" }, { "date": "2022-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1875" }, { "date": "2021-11-23T16:15:08.937000", "db": "NVD", "id": "CVE-2021-37006" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398837" }, { "date": "2022-11-28T05:13:00", "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1875" }, { "date": "2021-11-29T18:48:23.287000", "db": "NVD", "id": "CVE-2021-37006" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1875" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Improper Retention of Permissions Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015637" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1875" } ], "trust": 0.6 } }
var-202212-0590
Vulnerability from variot
The system tool has inconsistent serialization and deserialization. Successful exploitation of this vulnerability will cause unauthorized startup of components. Huawei of HarmonyOS and EMUI There is a vulnerability in deserialization of untrusted data.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0590", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "NVD", "id": "CVE-2022-41596" } ] }, "cve": "CVE-2022-41596", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-41596", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41596", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-41596", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-41596", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202212-2485", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "CNNVD", "id": "CNNVD-202212-2485" }, { "db": "NVD", "id": "CVE-2022-41596" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system tool has inconsistent serialization and deserialization. Successful exploitation of this vulnerability will cause unauthorized startup of components. Huawei of HarmonyOS and EMUI There is a vulnerability in deserialization of untrusted data.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-41596" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "VULHUB", "id": "VHN-437836" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41596", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023881", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2485", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437836", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437836" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "CNNVD", "id": "CNNVD-202212-2485" }, { "db": "NVD", "id": "CVE-2022-41596" } ] }, "id": "VAR-202212-0590", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437836" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:11:10.921000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218945" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.1 }, { "problemtype": "Deserialization of untrusted data (CWE-502) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437836" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "NVD", "id": "CVE-2022-41596" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41596" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41596/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437836" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "CNNVD", "id": "CNNVD-202212-2485" }, { "db": "NVD", "id": "CVE-2022-41596" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437836" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "CNNVD", "id": "CNNVD-202212-2485" }, { "db": "NVD", "id": "CVE-2022-41596" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-437836" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2485" }, { "date": "2022-12-20T21:15:10.910000", "db": "NVD", "id": "CVE-2022-41596" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-437836" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2485" }, { "date": "2022-12-24T04:12:38.470000", "db": "NVD", "id": "CVE-2022-41596" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2485" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Untrusted Data Deserialization Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023881" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2485" } ], "trust": 0.6 } }
var-202112-0352
Vulnerability from variot
There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed. plural Huawei A vulnerability related to use of freed memory exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0352", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" } ] }, "cve": "CVE-2021-37045", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2021-37045", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-398878", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37045", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37045", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37045", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37045", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2047", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398878", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" }, { "db": "NVD", "id": "CVE-2021-37045" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed. plural Huawei A vulnerability related to use of freed memory exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "VULHUB", "id": "VHN-398878" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37045", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015893", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2047", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398878", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" }, { "db": "NVD", "id": "CVE-2021-37045" } ] }, "id": "VAR-202112-0352", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398878" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:02:54.999000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "UAF\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173800" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37045" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" }, { "db": "NVD", "id": "CVE-2021-37045" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" }, { "db": "NVD", "id": "CVE-2021-37045" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398878" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2047" }, { "date": "2021-12-08T15:15:09.380000", "db": "NVD", "id": "CVE-2021-37045" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398878" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2047" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37045" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2047" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to use of freed memory in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015893" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2047" } ], "trust": 0.6 } }
var-202211-1082
Vulnerability from variot
The Display Service module has a UAF vulnerability. Successful exploitation of this vulnerability may affect the display service availability. Huawei of HarmonyOS and EMUI Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-1082", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "NVD", "id": "CVE-2022-44547" } ] }, "cve": "CVE-2022-44547", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-44547", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44547", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-44547", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-44547", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202211-2132", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "CNNVD", "id": "CNNVD-202211-2132" }, { "db": "NVD", "id": "CVE-2022-44547" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Display Service module has a UAF vulnerability. Successful exploitation of this vulnerability may affect the display service availability. Huawei of HarmonyOS and EMUI Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44547" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "VULHUB", "id": "VHN-441926" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44547", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020506", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2132", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441926", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441926" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "CNNVD", "id": "CNNVD-202211-2132" }, { "db": "NVD", "id": "CVE-2022-44547" } ] }, "id": "VAR-202211-1082", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441926" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:43:38.906000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213972" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441926" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "NVD", "id": "CVE-2022-44547" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44547" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44547/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441926" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "CNNVD", "id": "CNNVD-202211-2132" }, { "db": "NVD", "id": "CVE-2022-44547" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441926" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "CNNVD", "id": "CNNVD-202211-2132" }, { "db": "NVD", "id": "CVE-2022-44547" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441926" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2132" }, { "date": "2022-11-09T21:15:18.003000", "db": "NVD", "id": "CVE-2022-44547" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441926" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2132" }, { "date": "2022-11-10T13:50:42.190000", "db": "NVD", "id": "CVE-2022-44547" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2132" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020506" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2132" } ], "trust": 0.6 } }
var-202205-0115
Vulnerability from variot
The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS security component
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0115", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "NVD", "id": "CVE-2022-29792" } ] }, "cve": "CVE-2022-29792", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-29792", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-421301", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-29792", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-29792", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29792", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-29792", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202205-2550", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421301", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421301" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "CNNVD", "id": "CNNVD-202205-2550" }, { "db": "NVD", "id": "CVE-2022-29792" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS security component", "sources": [ { "db": "NVD", "id": "CVE-2022-29792" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "VULHUB", "id": "VHN-421301" }, { "db": "VULMON", "id": "CVE-2022-29792" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29792", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009629", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2550", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-50634", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421301", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29792", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421301" }, { "db": "VULMON", "id": "CVE-2022-29792" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "CNNVD", "id": "CNNVD-202205-2550" }, { "db": "NVD", "id": "CVE-2022-29792" } ] }, "id": "VAR-202205-0115", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421301" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:02:40.527000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193771" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "NVD", "id": "CVE-2022-29792" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29792" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29792/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421301" }, { "db": "VULMON", "id": "CVE-2022-29792" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "CNNVD", "id": "CNNVD-202205-2550" }, { "db": "NVD", "id": "CVE-2022-29792" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421301" }, { "db": "VULMON", "id": "CVE-2022-29792" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "CNNVD", "id": "CNNVD-202205-2550" }, { "db": "NVD", "id": "CVE-2022-29792" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421301" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29792" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2550" }, { "date": "2022-05-13T15:15:09.887000", "db": "NVD", "id": "CVE-2022-29792" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421301" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29792" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2550" }, { "date": "2022-05-23T18:41:49.983000", "db": "NVD", "id": "CVE-2022-29792" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2550" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009629" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2550" } ], "trust": 0.6 } }
var-202110-1851
Vulnerability from variot
There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1851", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" } ] }, "cve": "CVE-2021-37110", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37110", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398946", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37110", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37110", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37110", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37110", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-2230", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398946", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" }, { "db": "NVD", "id": "CVE-2021-37110" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37110", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017380", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2230", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398946", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37110", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" }, { "db": "NVD", "id": "CVE-2021-37110" } ] }, "id": "VAR-202110-1851", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398946" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:17:00.841000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176778" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37110" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" }, { "db": "NVD", "id": "CVE-2021-37110" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" }, { "db": "NVD", "id": "CVE-2021-37110" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398946" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37110" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2230" }, { "date": "2022-01-03T22:15:09", "db": "NVD", "id": "CVE-2021-37110" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398946" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37110" }, { "date": "2023-01-17T07:06:00", "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2230" }, { "date": "2022-01-11T19:27:32.067000", "db": "NVD", "id": "CVE-2021-37110" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2230" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2230" } ], "trust": 0.6 } }
var-202112-0222
Vulnerability from variot
There is a Improper Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to account authentication bypassed. Huawei Smartphones have an authentication vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a component of the product that does not effectively authenticate user identities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0222", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "NVD", "id": "CVE-2021-37100" } ] }, "cve": "CVE-2021-37100", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-37100", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398937", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37100", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37100", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37100", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37100", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-2023", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398937", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398937" }, { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "CNNVD", "id": "CNNVD-202109-2023" }, { "db": "NVD", "id": "CVE-2021-37100" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to account authentication bypassed. Huawei Smartphones have an authentication vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a component of the product that does not effectively authenticate user identities", "sources": [ { "db": "NVD", "id": "CVE-2021-37100" }, { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "VULHUB", "id": "VHN-398937" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37100", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015946", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2023", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103533", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398937", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398937" }, { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "CNNVD", "id": "CNNVD-202109-2023" }, { "db": "NVD", "id": "CVE-2021-37100" } ] }, "id": "VAR-202112-0222", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398937" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:01:15.817000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173501" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "CNNVD", "id": "CNNVD-202109-2023" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398937" }, { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "NVD", "id": "CVE-2021-37100" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37100" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398937" }, { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "CNNVD", "id": "CNNVD-202109-2023" }, { "db": "NVD", "id": "CVE-2021-37100" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398937" }, { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "CNNVD", "id": "CNNVD-202109-2023" }, { "db": "NVD", "id": "CVE-2021-37100" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398937" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2023" }, { "date": "2021-12-07T17:15:09.980000", "db": "NVD", "id": "CVE-2021-37100" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398937" }, { "date": "2022-12-05T01:40:00", "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2023" }, { "date": "2021-12-09T17:32:52.810000", "db": "NVD", "id": "CVE-2021-37100" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2023" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Authentication Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015946" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2023" } ], "trust": 0.6 } }
var-202112-0950
Vulnerability from variot
The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable. HarmonyOS Exists in a past traversal vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0950", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "NVD", "id": "CVE-2021-40001" } ] }, "cve": "CVE-2021-40001", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-40001", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401402", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-40001", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40001", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-40001", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-40001", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202112-208", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401402", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401402" }, { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "CNNVD", "id": "CNNVD-202112-208" }, { "db": "NVD", "id": "CVE-2021-40001" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable. HarmonyOS Exists in a past traversal vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40001" }, { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "VULHUB", "id": "VHN-401402" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40001", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-017519", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-208", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401402", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401402" }, { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "CNNVD", "id": "CNNVD-202112-208" }, { "db": "NVD", "id": "CVE-2021-40001" } ] }, "id": "VAR-202112-0950", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401402" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:23:02.016000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172732" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "CNNVD", "id": "CNNVD-202112-208" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401402" }, { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "NVD", "id": "CVE-2021-40001" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40001" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202112-0000001183296718" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401402" }, { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "CNNVD", "id": "CNNVD-202112-208" }, { "db": "NVD", "id": "CVE-2021-40001" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401402" }, { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "CNNVD", "id": "CNNVD-202112-208" }, { "db": "NVD", "id": "CVE-2021-40001" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401402" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-208" }, { "date": "2022-01-10T14:10:20.993000", "db": "NVD", "id": "CVE-2021-40001" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401402" }, { "date": "2023-01-24T05:51:00", "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-208" }, { "date": "2022-01-13T16:01:59.027000", "db": "NVD", "id": "CVE-2021-40001" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-208" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017519" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-208" } ], "trust": 0.6 } }
var-202206-0263
Vulnerability from variot
The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0263", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "NVD", "id": "CVE-2021-46812" } ] }, "cve": "CVE-2021-46812", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-46812", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423545", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-46812", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46812", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46812", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-46812", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202206-471", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423545", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46812", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "CNNVD", "id": "CNNVD-202206-471" }, { "db": "NVD", "id": "CVE-2021-46812" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46812", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011373", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-471", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66175", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423545", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46812", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "CNNVD", "id": "CNNVD-202206-471" }, { "db": "NVD", "id": "CVE-2021-46812" } ] }, "id": "VAR-202206-0263", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423545" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:42:44.444000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "NVD", "id": "CVE-2021-46812" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46812" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46812/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "CNNVD", "id": "CNNVD-202206-471" }, { "db": "NVD", "id": "CVE-2021-46812" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "CNNVD", "id": "CNNVD-202206-471" }, { "db": "NVD", "id": "CVE-2021-46812" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423545" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46812" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-471" }, { "date": "2022-06-13T16:15:08.137000", "db": "NVD", "id": "CVE-2021-46812" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423545" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2021-46812" }, { "date": "2023-08-21T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-471" }, { "date": "2022-06-18T03:12:06.017000", "db": "NVD", "id": "CVE-2021-46812" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-471" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011373" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-471" } ], "trust": 0.6 } }
var-202112-0285
Vulnerability from variot
There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting. plural Huawei Smartphone products contain an argument injection or modification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0285", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" } ] }, "cve": "CVE-2021-37040", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-37040", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-398873", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37040", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37040", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37040", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-37040", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202109-2050", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398873", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" }, { "db": "NVD", "id": "CVE-2021-37040" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting. plural Huawei Smartphone products contain an argument injection or modification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "VULHUB", "id": "VHN-398873" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37040", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015891", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2050", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08329", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398873", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" }, { "db": "NVD", "id": "CVE-2021-37040" } ] }, "id": "VAR-202112-0285", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398873" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:01:15.769000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Parameter\u00a0injection\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for injecting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=173803" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-88", "trust": 1.1 }, { "problemtype": "Insert or change arguments (CWE-88) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-74", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37040" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" }, { "db": "NVD", "id": "CVE-2021-37040" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" }, { "db": "NVD", "id": "CVE-2021-37040" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398873" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2050" }, { "date": "2021-12-08T15:15:09.267000", "db": "NVD", "id": "CVE-2021-37040" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398873" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2050" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37040" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2050" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Argument insertion or modification vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015891" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "parameter injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2050" } ], "trust": 0.6 } }
cve-2024-51528
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51528", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:40:39.394302Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:52:17.319Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper log printing in the Super Home Screen module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of improper log printing in the Super Home Screen module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:33:14.126Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51528", "datePublished": "2024-11-05T09:33:14.126Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T14:52:17.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31758
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.103Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:55:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31758", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31758", "datePublished": "2022-06-13T14:55:25", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52115
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.437Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The iaware module has a Use-After-Free (UAF) vulnerability. Successful exploitation of this vulnerability may affect the system functions." } ], "value": "The iaware module has a Use-After-Free (UAF) vulnerability. Successful exploitation of this vulnerability may affect the system functions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:22:31.324Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52115", "datePublished": "2024-01-16T08:22:31.324Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.437Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46766
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46766", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:22:22.671109Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:24:05.993Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:16:02.973Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46766", "datePublished": "2023-11-08T09:16:02.973Z", "dateReserved": "2023-10-26T11:33:04.518Z", "dateUpdated": "2024-09-04T19:24:05.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36500
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "4.2.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36500", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T19:48:38.560023Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T19:53:09.483Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.311Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the AMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Privilege escalation vulnerability in the AMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:19:31.788Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36500", "datePublished": "2024-06-14T07:19:31.788Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.311Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56455
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56455", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T14:43:47.951193Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T14:43:54.839Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T03:22:45.758Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56455", "datePublished": "2025-01-08T03:22:45.758Z", "dateReserved": "2024-12-26T08:45:46.160Z", "dateUpdated": "2025-01-08T14:43:54.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54108
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54108", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:01:01.456474Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:01:09.592Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Read/Write vulnerability in the image decoding module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Read/Write vulnerability in the image decoding module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T12:03:06.229Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54108", "datePublished": "2024-12-12T12:03:06.229Z", "dateReserved": "2024-11-29T02:34:46.790Z", "dateUpdated": "2024-12-12T15:01:09.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31753
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.119Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:06:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31753", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31753", "datePublished": "2022-06-13T15:06:07", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22430
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22430", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Logic bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22430", "datePublished": "2022-02-25T18:11:10", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39987
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": " Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39987", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Data Processing Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39987", "datePublished": "2022-01-03T21:07:37", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48512
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.801Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48512", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T18:55:31.975187Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T18:55:44.280Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use After Free (UAF) vulnerability in the Vdecoderservice service. Successful exploitation of this vulnerability may cause the image decoding feature to perform abnormally." } ], "value": "Use After Free (UAF) vulnerability in the Vdecoderservice service. Successful exploitation of this vulnerability may cause the image decoding feature to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:22:38.489Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48512", "datePublished": "2023-07-06T12:22:38.489Z", "dateReserved": "2023-06-29T11:23:50.333Z", "dateUpdated": "2024-11-19T18:55:44.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41601
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.027Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41601", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.027Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49248
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unauthorized file access in the Settings app. Successful exploitation of this vulnerability may cause unauthorized file access." } ], "value": "Vulnerability of unauthorized file access in the Settings app. Successful exploitation of this vulnerability may cause unauthorized file access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:34:22.774Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49248", "datePublished": "2023-12-06T08:34:22.774Z", "dateReserved": "2023-11-24T07:33:47.176Z", "dateUpdated": "2024-08-02T21:53:44.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34157
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.226Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34157", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-17T16:49:48.513928Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-17T16:51:14.050Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of HwWatchHealth being hijacked.Successful exploitation of this vulnerability may cause repeated pop-up windows of the app." } ], "value": "Vulnerability of HwWatchHealth being hijacked.Successful exploitation of this vulnerability may cause repeated pop-up windows of the app." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-16T06:55:57.262Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34157", "datePublished": "2023-06-16T06:55:57.262Z", "dateReserved": "2023-05-29T09:03:29.116Z", "dateUpdated": "2024-12-17T16:51:14.050Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34162
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-34162", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-11T18:47:02.000014Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-11T18:47:40.857Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Version update determination vulnerability in the user profile module.Successful exploitation of this vulnerability may cause repeated HMS Core updates and cause services to fail." } ], "problemTypes": [ { "descriptions": [ { "description": "External Control of System or Configuration Setting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34162", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-11T18:47:40.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51524
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51524", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:41:21.529225Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:03.632Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the Wi-Fi module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the Wi-Fi module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:15:43.707Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51524", "datePublished": "2024-11-05T09:15:43.707Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T14:53:03.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46856
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46856", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T13:53:01.710494Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T13:53:31.999Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe multi-screen collaboration module has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.\u003c/p\u003e" } ], "value": "The multi-screen collaboration module has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal vulnerability", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T09:04:20.703Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46856", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-17T13:53:31.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1693
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-1693", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-21T17:05:45.738246Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-21T17:06:30.404Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-20T14:12:33.342Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1693", "datePublished": "2023-05-20T14:12:33.342Z", "dateReserved": "2023-03-29T09:29:51.236Z", "dateUpdated": "2025-01-21T17:06:30.404Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42035
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42035", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T12:54:40.486843Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T12:57:08.400Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the App Multiplier module\u003cbr\u003eImpact:Successful exploitation of this vulnerability may affect functionality and confidentiality." } ], "value": "Permission control vulnerability in the App Multiplier module\nImpact:Successful exploitation of this vulnerability may affect functionality and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:26:10.805Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42035", "datePublished": "2024-08-08T09:26:10.805Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-08T12:57:08.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38985
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The facial recognition module has a vulnerability in input validation.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Input verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38985", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41300
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.961Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41300", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:56:17.985225Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:56:29.778Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of parameters not being strictly verified in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "value": "Vulnerability of parameters not being strictly verified in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:03:58.711Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41300", "datePublished": "2023-09-25T12:03:58.711Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T15:56:29.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40011
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI;HarmonyOS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI;HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" }, { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled resource consumption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T14:05:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40011", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI;HarmonyOS", "version": { "version_data": [ { "version_value": "EMUI 12.0.0,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" }, { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled resource consumption vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40011", "datePublished": "2022-01-07T22:39:31", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56442
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56442", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T15:17:54.579971Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:18:05.304Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of native APIs not being implemented in the NFC service module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of native APIs not being implemented in the NFC service module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-227", "description": "CWE-227: 7PK - API Abuse", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T02:20:03.579Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56442", "datePublished": "2025-01-08T02:20:03.579Z", "dateReserved": "2024-12-26T08:45:46.157Z", "dateUpdated": "2025-01-08T15:18:05.304Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37003
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.919Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:23:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37003", "datePublished": "2021-11-23T15:23:12", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.919Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39400
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.303Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39400", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:25.267703Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:36:45.978Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:36:38.636Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39400", "datePublished": "2023-08-13T12:36:38.636Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T19:36:45.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52376
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52376", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-22T13:29:44.977828Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-212", "description": "CWE-212 Improper Removal of Sensitive Information Before Storage or Transfer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-28T20:13:20.483Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Information management vulnerability in the Gallery module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Information management vulnerability in the Gallery module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Management Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:06:24.995Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52376", "datePublished": "2024-02-18T06:06:24.995Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-10-28T20:13:20.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48515
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48515", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T18:39:16.611340Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T18:39:24.994Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of inappropriate permission control in Nearby. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of inappropriate permission control in Nearby. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:46:13.191Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48515", "datePublished": "2023-07-06T12:46:13.191Z", "dateReserved": "2023-06-29T11:23:50.333Z", "dateUpdated": "2024-11-19T18:39:24.994Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39406
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39406", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T16:22:14.506505Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T16:22:22.713Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the XLayout component. Successful exploitation of this vulnerability may cause apps to forcibly restart." } ], "value": "Permission control vulnerability in the XLayout component. Successful exploitation of this vulnerability may cause apps to forcibly restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:42:27.139Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39406", "datePublished": "2023-08-13T12:42:27.139Z", "dateReserved": "2023-07-31T04:41:37.871Z", "dateUpdated": "2024-10-09T16:22:22.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48360
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.793Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48360", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T16:21:51.464129Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-19T16:22:24.765Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The facial recognition module has a vulnerability in file permission control. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48360", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-19T16:22:24.765Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58050
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58050", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:10:43.715377Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T15:10:57.666Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper access permission in the HDC module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of improper access permission in the HDC module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T07:21:29.387Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58050", "datePublished": "2025-03-04T07:21:29.387Z", "dateReserved": "2025-02-27T02:29:09.225Z", "dateUpdated": "2025-03-04T15:10:57.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52550
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.705Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52550", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-20T19:25:50.849949Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-20T19:34:53.596Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of data verification errors in the kernel module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of data verification errors in the kernel module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:56:22.568Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52550", "datePublished": "2024-04-08T08:56:22.568Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-08-20T19:34:53.596Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39672
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39672", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T13:14:00.377622Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T18:47:54.551Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory request logic vulnerability in the memory module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect integrity and availability." } ], "value": "Memory request logic vulnerability in the memory module.\nImpact: Successful exploitation of this vulnerability will affect integrity and availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:56:34.465Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39672", "datePublished": "2024-07-25T11:56:34.465Z", "dateReserved": "2024-06-27T08:24:56.589Z", "dateUpdated": "2024-08-02T04:26:15.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37006
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Preservation of Permissions vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:27:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Preservation of Permissions vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37006", "datePublished": "2021-11-23T15:27:27", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42037
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42037", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-09T18:01:36.363093Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-09T18:03:49.921Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of uncaught exceptions in the Graphics module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of uncaught exceptions in the Graphics module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:30:18.428Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42037", "datePublished": "2024-08-08T09:30:18.428Z", "dateReserved": "2024-07-27T06:52:58.401Z", "dateUpdated": "2024-08-09T18:03:49.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48359
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.865Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48359", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T16:28:02.410920Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-915", "description": "CWE-915 Improperly Controlled Modification of Dynamically-Determined Object Attributes", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-19T16:51:54.880Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The recovery mode for updates has a vulnerability that causes arbitrary disk modification. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary disk modification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48359", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-19T16:51:54.880Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31763
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:00.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has the null pointer and out-of-bounds array vulnerabilities. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds array vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:55:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31763", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel module has the null pointer and out-of-bounds array vulnerabilities. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds array vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31763", "datePublished": "2022-06-13T14:55:11", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:00.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32996
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32996", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:48:50.532409Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:49:53.728Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the account module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Privilege escalation vulnerability in the account module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:02:22.311Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32996", "datePublished": "2024-05-11T10:02:22.311Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37078
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote Denial of Service." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37078", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote Denial of Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncaught Exception vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37078", "datePublished": "2021-12-07T16:04:19", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58047
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58047", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:26:43.834323Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:26:54.111Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the media library module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission verification vulnerability in the media library module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T07:18:07.685Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58047", "datePublished": "2025-03-04T07:18:07.685Z", "dateReserved": "2025-02-27T02:29:09.224Z", "dateUpdated": "2025-03-04T14:26:54.111Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32990
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32990", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:50:58.531221Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:50:27.380Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the system sharing pop-up module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the system sharing pop-up module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:39:48.843Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32990", "datePublished": "2024-05-11T09:44:25.800Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22480
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.004Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The interface of a certain HarmonyOS module has an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to heap memory overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22480", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The interface of a certain HarmonyOS module has an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to heap memory overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22480", "datePublished": "2022-02-25T18:11:01", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.004Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42034
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42034", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T13:08:42.401805Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T13:09:16.945Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "LaunchAnywhere vulnerability in the account module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "LaunchAnywhere vulnerability in the account module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:23:38.895Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42034", "datePublished": "2024-08-08T09:23:38.895Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-08T13:09:16.945Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58046
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58046", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:27:17.655209Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:27:32.840Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the lock screen module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission management vulnerability in the lock screen module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T07:16:29.977Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58046", "datePublished": "2025-03-04T07:16:29.977Z", "dateReserved": "2025-02-27T02:29:09.224Z", "dateUpdated": "2025-03-04T14:27:32.840Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37095
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote denial of service and potential remote code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow or Wraparound vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37095", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote denial of service and potential remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow or Wraparound vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37095", "datePublished": "2021-12-07T16:06:22", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.785Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37075
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.793Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Credentials Management Errors vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37075", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Credentials Management Errors vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37075", "datePublished": "2021-12-08T14:13:00", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-47975
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:02:36.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-47975", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T20:03:55.334723Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "CWE-415 Double Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-09T20:03:59.379Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DUBAI module has a double free vulnerability. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Double free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-47975", "datePublished": "2023-01-06T00:00:00.000Z", "dateReserved": "2022-12-28T00:00:00.000Z", "dateUpdated": "2025-04-09T20:03:59.379Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32989
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32989", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:51:23.325172Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:24.753Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient verification vulnerability in the system sharing pop-up module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Insufficient verification vulnerability in the system sharing pop-up module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:38:14.085Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32989", "datePublished": "2024-05-11T09:42:32.952Z", "dateReserved": "2024-04-23T03:44:12.572Z", "dateUpdated": "2024-08-02T02:27:53.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46310
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.944Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46310", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T13:30:50.422815Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T13:31:24.907Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The TelephonyProvider module has a vulnerability in obtaining values.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Obtaining values vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46310", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-17T13:31:24.907Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37081
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.749Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to nearby crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37081", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to nearby crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37081", "datePublished": "2021-12-07T16:04:39", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52103
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52103", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T17:39:09.904038Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T14:35:16.766Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the FLP module. Successful exploitation of this vulnerability may cause out-of-bounds read." } ], "value": "Buffer overflow vulnerability in the FLP module. Successful exploitation of this vulnerability may cause out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:20:52.658Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52103", "datePublished": "2024-01-16T09:20:52.658Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-08-29T14:35:16.766Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41298
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.067Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41298", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T16:13:10.275479Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T16:13:21.160Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T11:40:32.313Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41298", "datePublished": "2023-09-25T11:40:32.313Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T16:13:21.160Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46759
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.862Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46759", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:22:17.571595Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:24:07.643Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the call module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the call module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T10:20:04.805Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46759", "datePublished": "2023-11-08T10:20:04.805Z", "dateReserved": "2023-10-26T11:32:55.336Z", "dateUpdated": "2024-09-04T14:24:07.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48513
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.733Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48513", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T18:53:52.475282Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T18:54:04.528Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of identity verification being bypassed in the Gallery module. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "value": "Vulnerability of identity verification being bypassed in the Gallery module. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:42:55.069Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48513", "datePublished": "2023-07-06T12:42:55.069Z", "dateReserved": "2023-06-29T11:23:50.333Z", "dateUpdated": "2024-11-19T18:54:04.528Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41595
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.288Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41595", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.288Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0117
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:02:43.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-0117", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-15T21:14:35.796347Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-15T21:14:43.039Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The online authentication provided by the hwKitAssistant lacks strict identity verification of applications. Successful exploitation of this vulnerability may affect availability of features,such as MeeTime." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-0117", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-01-09T00:00:00", "dateUpdated": "2025-01-15T21:14:43.039Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44561
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.775Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44561", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T13:46:32.881134Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T13:47:21.176Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The preset launcher module has a permission verification vulnerability. Successful exploitation of this vulnerability makes unauthorized apps add arbitrary widgets and shortcuts without interaction." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44561", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T13:47:21.176Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49243
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.846Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unauthorized access to email attachments in the email module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of unauthorized access to email attachments in the email module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:56:24.442Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49243", "datePublished": "2023-12-06T08:56:24.442Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:44.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52538
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52538", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T18:15:40.744850Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T13:39:28.794Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of package name verification being bypassed in the HwIms module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of package name verification being bypassed in the HwIms module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:43:01.514Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52538", "datePublished": "2024-04-08T08:43:01.514Z", "dateReserved": "2024-02-27T03:41:51.380Z", "dateUpdated": "2025-03-25T13:39:28.794Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41586
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.420Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The communication framework module has a vulnerability of not truncating data properly.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Untruncated data vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41586", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.420Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34165
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34165", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-17T16:52:26.173260Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-17T16:53:22.517Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the Save for later feature provided by AI Touch.Successful exploitation of this vulnerability may cause third-party apps to forge a URI for unauthorized access with zero permissions." } ], "value": "Unauthorized access vulnerability in the Save for later feature provided by AI Touch.Successful exploitation of this vulnerability may cause third-party apps to forge a URI for unauthorized access with zero permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Validation of Integrity Check Value", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-16T06:54:59.538Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34165", "datePublished": "2023-06-16T06:54:59.538Z", "dateReserved": "2023-05-29T09:03:29.119Z", "dateUpdated": "2024-12-17T16:53:22.517Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40031
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:35", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40031", "datePublished": "2022-01-07T22:39:35", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37083
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.855Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Denial of Service Attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "NULL Pointer Dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37083", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Denial of Service Attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL Pointer Dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37083", "datePublished": "2021-12-07T16:04:54", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38990
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38990", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38990", "datePublished": "2022-09-16T17:55:50", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22431
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuring permission isolation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:09", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22431", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuring permission isolation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22431", "datePublished": "2022-02-25T18:11:09", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32997
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32997", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:48:12.357889Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:50:07.625Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the binder driver module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Race condition vulnerability in the binder driver module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:04:44.743Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32997", "datePublished": "2024-05-11T10:04:44.743Z", "dateReserved": "2024-04-23T03:44:12.574Z", "dateUpdated": "2024-08-02T02:27:53.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54109
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54109", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:01:34.530012Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:01:42.585Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Read/Write vulnerability in the image decoding module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Read/Write vulnerability in the image decoding module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T12:04:06.624Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54109", "datePublished": "2024-12-12T12:04:06.624Z", "dateReserved": "2024-11-29T02:34:46.790Z", "dateUpdated": "2024-12-12T15:01:42.585Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22416
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.229Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:18:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22416", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Processing Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22416", "datePublished": "2021-08-03T17:18:38", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39398
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39398", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:32.301326Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:45:08.662Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-275", "description": "CWE-275 Permission Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:34:13.949Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39398", "datePublished": "2023-08-13T12:34:13.949Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-09T19:45:08.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52360
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52360", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T15:25:16.451936Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-511", "description": "CWE-511 Logic/Time Bomb", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-17T14:49:50.384Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Logic vulnerabilities in the baseband.Successful exploitation of this vulnerability may affect service integrity." } ], "value": "Logic vulnerabilities in the baseband.Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:58:49.848Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52360", "datePublished": "2024-02-18T02:58:49.848Z", "dateReserved": "2024-01-26T06:51:31.233Z", "dateUpdated": "2025-03-17T14:49:50.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39383
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.322Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39383", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:15:11.224532Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:16:00.993Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the AMS module. Successful exploitation of this vulnerability may compromise apps\u0027 data security." } ], "value": "Vulnerability of input parameters being not strictly verified in the AMS module. Successful exploitation of this vulnerability may compromise apps\u0027 data security." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:43:27.816Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39383", "datePublished": "2023-08-13T11:43:27.816Z", "dateReserved": "2023-07-31T04:41:32.210Z", "dateUpdated": "2024-10-10T14:16:00.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46773
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the PMS module. Successful exploitation of this vulnerability may cause privilege escalation." } ], "value": "Permission management vulnerability in the PMS module. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:31:12.555Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46773", "datePublished": "2023-12-06T08:31:12.555Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-08-02T20:53:21.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22469
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.833Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause kernel out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:32:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22469", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause kernel out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22469", "datePublished": "2021-10-28T12:32:55", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37242
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:33.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37242", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:01:41.398067Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T17:01:50.695Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of commands from the modem being intercepted in the atcmdserver module. Attackers may exploit this vulnerability to rewrite the non-volatile random-access memory (NVRAM), or facilitate the exploitation of other vulnerabilities." } ], "value": "Vulnerability of commands from the modem being intercepted in the atcmdserver module. Attackers may exploit this vulnerability to rewrite the non-volatile random-access memory (NVRAM), or facilitate the exploitation of other vulnerabilities." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639 Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:31:20.338Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37242", "datePublished": "2023-07-06T12:31:20.338Z", "dateReserved": "2023-06-29T10:23:01.714Z", "dateUpdated": "2024-11-19T17:01:50.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45448
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45448", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:09:15.541476Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:09:23.436Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "5.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Page table protection configuration vulnerability in the trusted firmware module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Page table protection configuration vulnerability in the trusted firmware module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:17:25.555Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45448", "datePublished": "2024-09-04T02:19:20.881Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-11-05T09:17:25.555Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46311
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46311", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T14:49:53.281509Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T14:51:46.896Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The contacts component has a free (undefined) provider vulnerability. Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Undefined provider vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46311", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-17T14:51:46.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38995
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.043Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38995", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38995", "datePublished": "2022-09-16T17:57:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22479
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The interface of a certain HarmonyOS module has an invalid address access vulnerability. Successful exploitation of this vulnerability may lead to kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Invalid address access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:10:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22479", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The interface of a certain HarmonyOS module has an invalid address access vulnerability. Successful exploitation of this vulnerability may lead to kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Invalid address access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22479", "datePublished": "2022-02-25T18:10:59", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46325
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:46.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46325", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T17:54:09.195548Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T18:18:22.458Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46325", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-16T18:18:22.458Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48355
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48355", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T18:23:06.386661Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-19T18:23:27.020Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has a heap out-of-bounds read vulnerability. Successful exploitation of this vulnerability can cause the Bluetooth process to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48355", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-19T18:23:27.020Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52361
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52361", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-09T15:29:48.319441Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-09T15:30:45.262Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.717Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The VerifiedBoot module has a vulnerability that may cause authentication errors.Successful exploitation of this vulnerability may affect integrity." } ], "value": "The VerifiedBoot module has a vulnerability that may cause authentication errors.Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:59:45.990Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52361", "datePublished": "2024-02-18T02:59:45.990Z", "dateReserved": "2024-01-26T06:51:31.234Z", "dateUpdated": "2024-12-09T15:30:45.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48496
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48496", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-17T15:32:34.361038Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-17T15:37:10.787Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of lax app identity verification in the pre-authorization function.Successful exploitation of this vulnerability will cause malicious apps to become pre-authorized." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48496", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-17T15:37:10.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48346
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48346", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T18:27:25.280237Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-19T18:27:55.968Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwContacts module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48346", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-19T18:27:55.968Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22432
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuring permission isolation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22432", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuring permission isolation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22432", "datePublished": "2022-02-25T18:11:11", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.386Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37000
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-37000", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-28T16:27:53.051438Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-28T16:30:46.102Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSome Huawei wearables have a permission management vulnerability.\u003c/span\u003e" } ], "value": "Some Huawei wearables have a permission management vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-255", "description": "CWE-255 Credentials Management Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-28T06:47:41.434Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37000", "datePublished": "2024-12-28T06:47:41.434Z", "dateReserved": "2021-07-20T14:44:09.812Z", "dateUpdated": "2024-12-28T16:30:46.102Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5464
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5464", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-18T15:30:32.565891Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-18T15:39:14.019Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:11:12.788Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of insufficient permission verification in the NearLink module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of insufficient permission verification in the NearLink module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:29:51.982Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-5464", "datePublished": "2024-06-14T07:29:51.982Z", "dateReserved": "2024-05-29T07:57:39.735Z", "dateUpdated": "2024-08-01T21:11:12.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44562
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44562", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T14:33:56.772260Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T14:34:10.551Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The system framework layer has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44562", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T14:34:10.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37040
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.651Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting." } ], "problemTypes": [ { "descriptions": [ { "description": "Parameter injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:11:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Parameter injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37040", "datePublished": "2021-12-08T14:11:56", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38982
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The fingerprint module has service logic errors.Successful exploitation of this vulnerability will cause the phone lock to be cracked." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic error vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38982", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40029
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability due to a boundary error with the Samba server", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40029", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability due to a boundary error with the Samba server" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40029", "datePublished": "2022-01-07T22:39:34", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51512
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51512", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:42:40.596534Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:58.713Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of parameter type not being verified in the WantAgent module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of parameter type not being verified in the WantAgent module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:39:59.207Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51512", "datePublished": "2024-11-05T08:39:59.207Z", "dateReserved": "2024-10-29T01:43:54.523Z", "dateUpdated": "2024-11-05T14:53:58.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37134
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:16:02.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Location-related APIs exists a Race Condition vulnerability.Successful exploitation of this vulnerability may use Higher Permissions for invoking the interface of location-related components." } ], "problemTypes": [ { "descriptions": [ { "description": "Race Condition", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37134", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Location-related APIs exists a Race Condition vulnerability.Successful exploitation of this vulnerability may use Higher Permissions for invoking the interface of location-related components." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race Condition" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37134", "datePublished": "2022-01-03T21:07:19", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:16:02.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:11:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37005", "datePublished": "2022-08-09T20:11:06", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39394
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39394", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T13:48:29.702173Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T13:49:18.573Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of API privilege escalation in the wifienhance module. Successful exploitation of this vulnerability may cause the arp list to be modified." } ], "value": "Vulnerability of API privilege escalation in the wifienhance module. Successful exploitation of this vulnerability may cause the arp list to be modified." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:26:40.032Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39394", "datePublished": "2023-08-13T12:26:40.032Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-10T13:49:18.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40000
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40000", "datePublished": "2022-01-07T22:39:26", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40021
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40021", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write " } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40021", "datePublished": "2022-01-07T22:39:43", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27897
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-27897", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T13:53:56.641126Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-01T13:56:01.303Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:41:55.777Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the call module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Input verification vulnerability in the call module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:25:40.641Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-27897", "datePublished": "2024-04-08T09:25:40.641Z", "dateReserved": "2024-02-27T03:43:01.541Z", "dateUpdated": "2024-08-02T00:41:55.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40030
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:11:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40030", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40030", "datePublished": "2022-08-09T20:11:10", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56440
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56440", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T15:27:54.591208Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:28:04.629Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the Connectivity module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Permission control vulnerability in the Connectivity module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T02:08:46.885Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56440", "datePublished": "2025-01-08T02:08:46.885Z", "dateReserved": "2024-12-26T08:45:46.157Z", "dateUpdated": "2025-01-08T15:28:04.629Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40027
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.425Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality.\u003c/p\u003e" } ], "value": "The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T13:02:50.922Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40027", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Calculation of Buffer Size" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40027", "datePublished": "2022-01-07T22:39:45", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.425Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37008
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:22:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37008", "datePublished": "2021-11-23T15:22:33", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39988
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": " NULL Pointer Dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39988", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39988", "datePublished": "2022-01-03T21:07:38", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37076
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37076", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37076", "datePublished": "2021-12-07T16:04:08", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52113
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "launchAnyWhere vulnerability in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability." } ], "value": "launchAnyWhere vulnerability in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:58:43.439Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52113", "datePublished": "2024-01-16T07:58:43.439Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46313
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46313", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T13:29:44.342614Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T13:30:16.574Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The sensor privacy module has an authentication vulnerability. Successful exploitation of this vulnerability may cause unavailability of the smartphone\u0027s camera and microphone." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46313", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-17T13:30:16.574Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-57958
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-57958", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T14:38:27.499649Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-06T14:38:36.148Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" }, { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "4.3.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds array read vulnerability in the FFRT module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Out-of-bounds array read vulnerability in the FFRT module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T12:29:41.313Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/2/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-57958", "datePublished": "2025-02-06T12:29:41.313Z", "dateReserved": "2025-01-22T03:37:52.395Z", "dateUpdated": "2025-02-06T14:38:36.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The distributed data service component has a vulnerability in data access control. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The distributed data service component has a vulnerability in data access control. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40005", "datePublished": "2022-01-07T22:39:30", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41600
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.484Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41600", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.484Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37004
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.259Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-box experience bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-box experience bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37004", "datePublished": "2022-08-09T20:10:55", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.259Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41584
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41584", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47292
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47292", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:12:04.352298Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:12:13.816Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Path traversal vulnerability in the Bluetooth module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Path traversal vulnerability in the Bluetooth module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:19:33.920Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47292", "datePublished": "2024-09-27T10:19:33.920Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T15:12:13.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44557
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.901Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44557", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T13:55:39.215445Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T13:56:40.744Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The SmartTrimProcessEvent module has a vulnerability of obtaining the read and write permissions on arbitrary system files. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44557", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T13:56:40.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48510
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48510", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T16:59:45.687031Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T16:59:53.752Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the AMS module. Successful exploitation of this vulnerability will cause unauthorized operations." } ], "value": "Input verification vulnerability in the AMS module. Successful exploitation of this vulnerability will cause unauthorized operations." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:39:00.248Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48510", "datePublished": "2023-07-06T12:39:00.248Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-11-19T16:59:53.752Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44115
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44115", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T18:59:20.274116Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T18:59:37.028Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission control in the Booster module. Impact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of improper permission control in the Booster module. Impact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T03:59:40.013Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44115", "datePublished": "2023-11-08T03:59:40.013Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-09-04T18:59:37.028Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46317
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46317", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T18:11:45.637166Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T18:21:30.969Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The power consumption module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46317", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-16T18:21:30.969Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52371
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52371", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:43:42.044147Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:58:27.973Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of null references in the motor module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of null references in the motor module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:42:59.747Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52371", "datePublished": "2024-02-18T03:42:59.747Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-12-04T16:58:27.973Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54099
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54099", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:24:24.877082Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:24:42.068Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "File replacement vulnerability on some devices\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "value": "File replacement vulnerability on some devices\nImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T11:23:40.542Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54099", "datePublished": "2024-12-12T11:23:40.542Z", "dateReserved": "2024-11-29T02:34:46.789Z", "dateUpdated": "2024-12-12T15:24:42.068Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41293
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41293", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:10:47.087990Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:12:33.027Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Data security classification vulnerability in the DDMP module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Data security classification vulnerability in the DDMP module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-227", "description": "CWE-227: 7PK - API Abuse", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:18:42.425Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41293", "datePublished": "2023-09-25T12:18:42.425Z", "dateReserved": "2023-08-28T12:17:07.353Z", "dateUpdated": "2024-09-24T15:12:33.027Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44102
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44102", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:24:00.309066Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:24:20.522Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability can cause the Bluetooth function to be unavailable." } ], "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability can cause the Bluetooth function to be unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:50:20.615Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44102", "datePublished": "2023-10-11T11:50:20.615Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:24:20.522Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52106
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission verification for APIs in the DownloadProviderMain module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect integrity and availability." } ], "value": "Vulnerability of permission verification for APIs in the DownloadProviderMain module.\nImpact: Successful exploitation of this vulnerability will affect integrity and availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:23:26.566Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52106", "datePublished": "2024-01-16T09:26:20.061Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-09-04T01:23:26.566Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37014
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to device cannot be used properly." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:01:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37014", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to device cannot be used properly." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37014", "datePublished": "2021-12-07T16:01:50", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29789
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiAIserver has a vulnerability in verifying the validity of the properties used in the model.Successful exploitation of this vulnerability will affect AI services." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:03:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29789", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HiAIserver has a vulnerability in verifying the validity of the properties used in the model.Successful exploitation of this vulnerability will affect AI services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstrict verification vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29789", "datePublished": "2022-05-13T15:03:59", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39996
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/12/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI;HarmonyOS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI;HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 10.0.0,EMUI 10.1.0,EMUI 10.1.1,EMUI 11.0.0,EMUI 11.0.1" }, { "status": "affected", "version": "Magic UI 3.0.0,Magic UI 3.1.0,Magic UI 3.1.1,Magic UI 4.0.0" }, { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39996", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI;HarmonyOS", "version": { "version_data": [ { "version_value": "EMUI 10.0.0,EMUI 10.1.0,EMUI 10.1.1,EMUI 11.0.0,EMUI 11.0.1" }, { "version_value": "Magic UI 3.0.0,Magic UI 3.1.0,Magic UI 3.1.1,Magic UI 4.0.0" }, { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/12/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39996", "datePublished": "2022-01-07T22:39:49", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52378
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52378", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T19:00:23.207930Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-28T23:40:42.163Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.780Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incorrect service logic in the WindowManagerServices module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of incorrect service logic in the WindowManagerServices module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:09:05.754Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52378", "datePublished": "2024-02-18T06:09:05.754Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2025-03-28T23:40:42.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52112
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.492Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized file access vulnerability in the wallpaper service module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Unauthorized file access vulnerability in the wallpaper service module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:57:06.023Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52112", "datePublished": "2024-01-16T07:57:06.023Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30417
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30417", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T15:45:44.679051Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-29T00:00:34.715Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Path traversal vulnerability in the Bluetooth-based sharing module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Path traversal vulnerability in the Bluetooth-based sharing module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:16:15.889Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30417", "datePublished": "2024-04-07T08:16:15.889Z", "dateReserved": "2024-03-27T03:38:10.315Z", "dateUpdated": "2025-03-29T00:00:34.715Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41295
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41295", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T20:44:45.781241Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T20:44:55.989Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission management in the displayengine module. Successful exploitation of this vulnerability may cause the screen to turn dim." } ], "value": "Vulnerability of improper permission management in the displayengine module. Successful exploitation of this vulnerability may cause the screen to turn dim." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-12T01:10:43.001Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41295", "datePublished": "2023-09-25T11:02:55.849Z", "dateReserved": "2023-08-28T12:17:07.353Z", "dateUpdated": "2024-09-24T20:44:55.989Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38977
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.670Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwAirlink module has a heap overflow vulnerability.Successful exploitation of this vulnerability may cause out-of-bounds writes, resulting in modification of sensitive data." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38977", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56443
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56443", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T14:40:53.645840Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T14:41:31.832Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cross-process screen stack vulnerability in the UIExtension module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T02:37:31.730Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56443", "datePublished": "2025-01-08T02:37:31.730Z", "dateReserved": "2024-12-26T08:45:46.157Z", "dateUpdated": "2025-01-08T14:41:31.832Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46840
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has an out-of-bounds access vulnerability in parameter set verification.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46840", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52551
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52551", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T17:20:22.094222Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-01T18:41:43.394Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.905Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of data verification errors in the kernel module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of data verification errors in the kernel module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:57:32.246Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52551", "datePublished": "2024-04-08T08:57:32.246Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-11-01T18:41:43.394Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41594
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.699Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41594", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22295
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.358Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a permission bypass vulnerability. Local attackers may exploit this vulnerability to cause the device to hang due to the page error OsVmPageFaultHandler." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-06T12:54:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22295", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a permission bypass vulnerability. Local attackers may exploit this vulnerability to cause the device to hang due to the page error OsVmPageFaultHandler." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22295", "datePublished": "2021-08-06T12:54:49", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.358Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41603
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.411Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41603", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.411Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40025
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The eID module has a vulnerability that causes the memory to be used without being initialized,Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Management Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40025", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The eID module has a vulnerability that causes the memory to be used without being initialized,Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40025", "datePublished": "2022-01-07T22:39:44", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.454Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22257
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:18", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22257", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22257", "datePublished": "2022-04-11T19:38:18", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52111
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-52111", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T20:34:36.158193Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T20:38:40.556Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Authorization vulnerability in the BootLoader module. Successful exploitation of this vulnerability may affect service integrity." } ], "value": "Authorization vulnerability in the BootLoader module. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:55:41.863Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52111", "datePublished": "2024-01-16T07:55:41.863Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-11-13T20:38:40.556Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37091
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.789Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions,Privileges,and Access Controls vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37091", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permissions,Privileges,and Access Controls vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37091", "datePublished": "2021-12-07T16:06:07", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22256
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper access control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22256", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper access control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22256", "datePublished": "2022-04-11T19:38:19", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.317Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52373
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52373", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T15:20:36.325399Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-27T19:59:28.812Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission verification in the content sharing pop-up module.Successful exploitation of this vulnerability may cause unauthorized file sharing." } ], "value": "Vulnerability of permission verification in the content sharing pop-up module.Successful exploitation of this vulnerability may cause unauthorized file sharing." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:52:33.681Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52373", "datePublished": "2024-02-18T03:52:33.681Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2025-03-27T19:59:28.812Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39968
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.130Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Changlian Blocklist has a Business Logic Errors vulnerability .Successful exploitation of this vulnerability may expand the attack surface of the message class." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39968", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Changlian Blocklist has a Business Logic Errors vulnerability .Successful exploitation of this vulnerability may expand the attack surface of the message class." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Business Logic Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39968", "datePublished": "2022-01-03T21:07:19", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.130Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1694
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:25.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-1694", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-21T17:03:27.808188Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-21T17:04:59.145Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-20T14:13:46.239Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1694", "datePublished": "2023-05-20T14:13:46.239Z", "dateReserved": "2023-03-29T09:29:52.497Z", "dateUpdated": "2025-01-21T17:04:59.145Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37039
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.540Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Input verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:11:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37039", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37039", "datePublished": "2021-12-08T14:11:51", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.540Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40017
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.453Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module lacks the validity check of the key format. Successful exploitation of this vulnerability may result in out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40017", "datePublished": "2022-09-16T00:00:00", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37010
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:27:09", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37010", "datePublished": "2021-11-23T15:27:09", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.567Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39010
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwChrService module has a vulnerability in permission control. Successful exploitation of this vulnerability may cause disclosure of user network information." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwChrService module has a vulnerability in permission control. Successful exploitation of this vulnerability may cause disclosure of user network information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39010", "datePublished": "2022-09-16T17:57:54", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38987
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38987", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38987", "datePublished": "2022-09-16T17:55:59", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37001
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The diag-router module has a vulnerability in intercepting excessive long and short instructions. Successful exploitation of this vulnerability will cause the diag-router module to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Copy without Checking Size of Input", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The diag-router module has a vulnerability in intercepting excessive long and short instructions. Successful exploitation of this vulnerability will cause the diag-router module to crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Copy without Checking Size of Input" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37001", "datePublished": "2022-08-09T20:10:41", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.475Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54098
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54098", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:23:03.283731Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:23:48.630Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Service logic error vulnerability in the system service module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service integrity." } ], "value": "Service logic error vulnerability in the system service module\nImpact: Successful exploitation of this vulnerability may affect service integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T11:13:47.089Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54098", "datePublished": "2024-12-12T11:13:47.089Z", "dateReserved": "2024-11-29T02:34:46.789Z", "dateUpdated": "2024-12-12T15:23:48.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37024
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.495Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:26:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37024", "datePublished": "2021-11-23T15:26:15", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.495Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49247
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission verification vulnerability in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:32:36.621Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49247", "datePublished": "2023-12-06T08:32:36.621Z", "dateReserved": "2023-11-24T07:33:47.176Z", "dateUpdated": "2024-08-02T21:53:45.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56434
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56434", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T17:21:12.522965Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T17:23:55.702Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "UAF vulnerability in the device node access module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "value": "UAF vulnerability in the device node access module\nImpact: Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-672", "description": "CWE-672 Operation on a Resource after Expiration or Release", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T01:32:32.297Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56434", "datePublished": "2025-01-08T01:32:32.297Z", "dateReserved": "2024-12-26T08:45:46.156Z", "dateUpdated": "2025-01-08T17:23:55.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22484
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-22484", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-28T16:21:39.972638Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-28T16:25:52.298Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSome Huawei wearables have a vulnerability of not verifying the actual data size when reading data.\u003c/span\u003e\n\n\u003cbr\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSuccessful exploitation of this vulnerability may cause a server out of memory (OOM).\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "Some Huawei wearables have a vulnerability of not verifying the actual data size when reading data.\n\n\n\n\nSuccessful exploitation of this vulnerability may cause a server out of memory (OOM)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-28T06:50:40.877Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22484", "datePublished": "2024-12-28T06:50:40.877Z", "dateReserved": "2021-01-05T17:35:31.345Z", "dateUpdated": "2024-12-28T16:25:52.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48509
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.685Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48509", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:00:12.381259Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T17:00:22.497Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability due to multi-thread access to mutually exclusive resources in Huawei Share. Successful exploitation of this vulnerability may cause the program to exit abnormally." } ], "value": "Race condition vulnerability due to multi-thread access to mutually exclusive resources in Huawei Share. Successful exploitation of this vulnerability may cause the program to exit abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:38:03.921Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48509", "datePublished": "2023-07-06T12:38:03.921Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-11-19T17:00:22.497Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52358
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52358", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T00:10:44.164340Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-14T19:39:40.148Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.703Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of configuration defects in some APIs of the audio module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of configuration defects in some APIs of the audio module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:57:29.843Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52358", "datePublished": "2024-02-18T02:57:29.843Z", "dateReserved": "2024-01-26T06:51:31.233Z", "dateUpdated": "2024-11-14T19:39:40.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22455
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.324Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause the memory which is not released." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow or Wraparound", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:32:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22455", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause the memory which is not released." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22455", "datePublished": "2021-10-28T12:32:11", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.324Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40053
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.826Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0,HarmonyOS 2.1" }, { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:53:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0,HarmonyOS 2.1" }, { "version_value": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40053", "datePublished": "2022-03-07T13:50:29", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.826Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31751
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Multi-thread contention vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:54:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31751", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Multi-thread contention vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31751", "datePublished": "2022-06-13T14:55:41", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54122
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54122", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:20:43.879653Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:42:52.622Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Concurrent variable access vulnerability in the ability module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Concurrent variable access vulnerability in the ability module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T12:20:06.703Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54122", "datePublished": "2024-12-12T12:20:06.703Z", "dateReserved": "2024-11-29T02:34:46.792Z", "dateUpdated": "2024-12-12T15:42:52.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37008
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Verification bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Verification bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37008", "datePublished": "2022-08-09T20:10:47", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52552
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.847Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52552", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-20T19:54:32.665219Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-20T20:00:53.549Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the power module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Input verification vulnerability in the power module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:58:38.190Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52552", "datePublished": "2024-04-08T08:58:38.190Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-08-20T20:00:53.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34742
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Read/Write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:11:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34742", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Read/Write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34742", "datePublished": "2022-07-11T13:53:29", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22451
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow or Wraparound", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22451", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22451", "datePublished": "2021-10-28T12:31:11", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37017
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:24:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37017", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37017", "datePublished": "2021-11-23T15:24:12", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48314
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48314", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T16:54:32.398034Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T16:54:36.615Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Bluetooth vulnerability confidentiality", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-16T07:11:54.749Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48314", "datePublished": "2023-04-16T07:11:54.749Z", "dateReserved": "2023-02-06T03:32:29.062Z", "dateUpdated": "2025-02-06T16:54:36.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.508Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:24:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37005", "datePublished": "2021-11-23T15:24:38", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.508Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22433
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22433", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22433", "datePublished": "2022-02-25T18:11:08", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54116
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54116", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:20:54.278097Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:43:21.982Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the M3U8 module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Out-of-bounds read vulnerability in the M3U8 module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T12:12:38.715Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54116", "datePublished": "2024-12-12T12:12:38.715Z", "dateReserved": "2024-11-29T02:34:46.791Z", "dateUpdated": "2024-12-12T15:43:21.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48356
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48356", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T18:20:13.954290Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-19T18:22:03.893Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The facial recognition module has a vulnerability in input parameter verification. Successful exploitation of this vulnerability may cause failed facial recognition." } ], "problemTypes": [ { "descriptions": [ { "description": "Input parameter verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48356", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-19T18:22:03.893Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39967
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper broadcast permission settings", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39967", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper broadcast permission settings" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39967", "datePublished": "2022-01-03T21:07:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44109
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.707Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Clone vulnerability in the huks ta module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Clone vulnerability in the huks ta module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:41:47.947Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44109", "datePublished": "2023-10-11T10:41:47.947Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-08-02T19:59:50.707Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41599
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.465Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-41599", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T18:18:31.572710Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T18:22:27.580Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The system service has a vulnerability that causes incorrect return values. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect return value vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41599", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-09-27T00:00:00.000Z", "dateUpdated": "2025-04-16T18:22:27.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36499
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36499", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T16:18:23.453375Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T16:18:31.537Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unauthorized screenshot capturing in the WMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of unauthorized screenshot capturing in the WMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:17:27.308Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36499", "datePublished": "2024-06-14T07:17:27.308Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46763
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.077Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46763", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:53:04.488901Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:55:04.015Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of background app permission management in the framework module. Successful exploitation of this vulnerability may cause background apps to start maliciously." } ], "value": "Vulnerability of background app permission management in the framework module. Successful exploitation of this vulnerability may cause background apps to start maliciously." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:33:20.439Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46763", "datePublished": "2023-11-08T09:33:20.439Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T14:55:04.015Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34736
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:52:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34736", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34736", "datePublished": "2022-07-11T13:52:58", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.053Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34158
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:53.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-34158", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-11T17:34:34.632397Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-11T17:34:38.627Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34158", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-11T17:34:38.627Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46886
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46886", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-16T16:22:28.398029Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-16T16:23:12.177Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46886", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2025-01-16T16:23:12.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52100
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Celia Keyboard module has a vulnerability in access control. Successful exploitation of this vulnerability may affect availability." } ], "value": "The Celia Keyboard module has a vulnerability in access control. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:15:58.942Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52100", "datePublished": "2024-01-16T09:15:58.942Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-08-02T22:48:12.454Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52108
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of process priorities being raised in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of process priorities being raised in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:43:08.695Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52108", "datePublished": "2024-01-16T08:43:08.695Z", "dateReserved": "2023-12-27T02:33:17.231Z", "dateUpdated": "2024-08-02T22:48:12.490Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48358
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48358", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T16:53:02.226672Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-19T16:53:19.896Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The BatteryHealthActivity has a redirection vulnerability. Successful exploitation of this vulnerability by a malicious app can cause service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Redirection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48358", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-19T16:53:19.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38980
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.854Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwAirlink module has a heap overflow vulnerability in processing data packets of the proprietary protocol.Successful exploitation of this vulnerability may allow attackers to obtain process control permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38980", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34163
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.212Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-34163", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-11T18:50:19.144356Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-11T18:51:34.888Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Permission control vulnerability in the window management module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34163", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-11T18:51:34.888Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51525
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51525", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:41:13.120562Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:52:55.816Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the clipboard module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the clipboard module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:19:14.465Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51525", "datePublished": "2024-11-05T09:19:14.465Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T14:52:55.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48495
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.534Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48495", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-17T15:40:06.669769Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-17T15:40:46.533Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of unauthorized access to foreground app information.Successful exploitation of this vulnerability may cause foreground app information to be obtained." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48495", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-17T15:40:46.533Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46814
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory read/write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:54:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46814", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds memory read/write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46814", "datePublished": "2022-06-13T14:54:56", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39000
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.427Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup." } ], "problemTypes": [ { "descriptions": [ { "description": "Malicious app control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Malicious app control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39000", "datePublished": "2022-09-16T17:55:46", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.427Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37026
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.743Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:23:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37026", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37026", "datePublished": "2021-11-23T15:23:49", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.743Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41296
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41296", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T16:21:43.121477Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T16:21:50.631Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of missing authorization in the kernel module. Successful exploitation of this vulnerability may affect integrity and confidentiality." } ], "value": "Vulnerability of missing authorization in the kernel module. Successful exploitation of this vulnerability may affect integrity and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T11:37:37.692Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41296", "datePublished": "2023-09-25T11:37:37.692Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T16:21:50.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54115
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54115", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:20:56.685373Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:43:42.602Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the DASH module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Out-of-bounds read vulnerability in the DASH module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T12:11:32.505Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54115", "datePublished": "2024-12-12T12:11:32.505Z", "dateReserved": "2024-11-29T02:34:46.791Z", "dateUpdated": "2024-12-12T15:43:42.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51519
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51519", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:41:30.337559Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:11.838Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters not being verified in the HDC module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of input parameters not being verified in the HDC module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:09:47.049Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51519", "datePublished": "2024-11-05T09:09:47.049Z", "dateReserved": "2024-10-29T01:43:54.525Z", "dateUpdated": "2024-11-05T14:53:11.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45444
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45444", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:19:19.085492Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:21:46.703Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the WMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the WMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:51:49.034Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45444", "datePublished": "2024-09-04T01:51:49.034Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:21:46.703Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37133
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:16:03.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "9.1.0" }, { "status": "affected", "version": "9.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized file access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37133", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "9.1.0" }, { "version_affected": "=", "version_value": "9.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.1.1" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized file access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37133", "datePublished": "2022-01-03T21:07:40", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:16:03.180Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41598
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41598", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48297
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48297", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-25T13:49:48.861642Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1284", "description": "CWE-1284 Improper Validation of Specified Quantity in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T13:50:13.584Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The geofencing kernel code has a vulnerability of not verifying the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48297", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-25T13:50:13.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40022
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40022", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40022", "datePublished": "2022-01-07T22:39:44", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40047
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Release of Resource after Effective Lifetime", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:51:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Release of Resource after Effective Lifetime" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40047", "datePublished": "2022-03-07T13:51:07", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49239
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.629Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-49239", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-02T15:01:43.341990Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T15:02:06.497Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:04:40.379Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49239", "datePublished": "2023-12-06T09:04:40.379Z", "dateReserved": "2023-11-24T07:33:47.174Z", "dateUpdated": "2024-12-02T15:02:06.497Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38993
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38993", "datePublished": "2022-09-16T17:55:53", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58048
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58048", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:25:25.525530Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:25:57.864Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multi-thread problem vulnerability in the package management module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Multi-thread problem vulnerability in the package management module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T07:19:07.453Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58048", "datePublished": "2025-03-04T07:19:07.453Z", "dateReserved": "2025-02-27T02:29:09.225Z", "dateUpdated": "2025-03-04T14:25:57.864Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34737
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission assignment vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:35", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34737", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission assignment vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34737", "datePublished": "2022-07-11T13:53:35", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52553
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52553", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T18:20:08.622982Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T16:04:10.630Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the Wi-Fi module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Race condition vulnerability in the Wi-Fi module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:00:03.869Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52553", "datePublished": "2024-04-08T09:00:03.869Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-11-05T16:04:10.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22424
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Kernel Memory Leakage Vulnerability. Local attackers may exploit this vulnerability to cause Kernel Denial of Service." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Release of Resource after Effective Lifetime", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:17:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22424", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Kernel Memory Leakage Vulnerability. Local attackers may exploit this vulnerability to cause Kernel Denial of Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Release of Resource after Effective Lifetime" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22424", "datePublished": "2021-08-03T17:17:48", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51529
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51529", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:40:33.594311Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:51:53.664Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Data verification vulnerability in the battery module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect function stability." } ], "value": "Data verification vulnerability in the battery module\nImpact: Successful exploitation of this vulnerability may affect function stability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T11:18:31.133Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51529", "datePublished": "2024-11-05T11:18:31.133Z", "dateReserved": "2024-10-29T01:43:54.527Z", "dateUpdated": "2024-11-05T14:51:53.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46762
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46762", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:35:00.502651Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:36:31.487Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:32:04.437Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46762", "datePublished": "2023-11-08T09:32:04.437Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T19:36:31.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56441
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56441", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T15:18:17.866229Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:18:46.112Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the Bastet module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Race condition vulnerability in the Bastet module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T02:12:46.961Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56441", "datePublished": "2025-01-08T02:12:46.961Z", "dateReserved": "2024-12-26T08:45:46.157Z", "dateUpdated": "2025-01-08T15:18:46.112Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46851
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.934Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46851", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T17:35:25.764438Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T17:35:30.794Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DRM module has a vulnerability in verifying the secure memory attributes. Successful exploitation of this vulnerability may cause abnormal video playback." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46851", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T17:35:30.794Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48291
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48291", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T18:35:33.168431Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-19T18:37:21.694Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has an authentication bypass vulnerability in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48291", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-02-19T18:37:21.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58111
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58111", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:30:25.946972Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T13:30:34.139Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Exception capture failure vulnerability in the SVG parsing module of the ArkUI framework\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Exception capture failure vulnerability in the SVG parsing module of the ArkUI framework\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:37:11.430Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58111", "datePublished": "2025-04-07T03:37:11.430Z", "dateReserved": "2025-03-27T07:13:48.462Z", "dateUpdated": "2025-04-07T13:30:34.139Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38981
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.670Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwAirlink module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause information leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38981", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51511
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51511", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:42:46.055962Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:54:07.708Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of parameter type not being verified in the WantAgent module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of parameter type not being verified in the WantAgent module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:37:05.745Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51511", "datePublished": "2024-11-05T08:37:05.745Z", "dateReserved": "2024-10-29T01:43:54.523Z", "dateUpdated": "2024-11-05T14:54:07.708Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54096
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54096", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T14:32:58.530250Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T14:33:28.512Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper access control in the MTP module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect integrity and accuracy." } ], "value": "Vulnerability of improper access control in the MTP module\nImpact: Successful exploitation of this vulnerability may affect integrity and accuracy." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T11:10:17.921Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54096", "datePublished": "2024-12-12T11:10:17.921Z", "dateReserved": "2024-11-29T02:34:46.789Z", "dateUpdated": "2024-12-12T14:33:28.512Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40051
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40051", "datePublished": "2022-03-07T13:50:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30414
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30414", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-20T20:24:29.578357Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-20T20:28:41.866Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Command injection vulnerability in the AccountManager module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Command injection vulnerability in the AccountManager module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:04:37.661Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30414", "datePublished": "2024-04-07T08:04:37.661Z", "dateReserved": "2024-03-27T03:38:10.314Z", "dateUpdated": "2024-08-20T20:28:41.866Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48519
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48519", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T16:54:57.686932Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T16:55:11.908Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:54:22.659Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48519", "datePublished": "2023-07-06T12:54:22.659Z", "dateReserved": "2023-06-29T11:23:50.334Z", "dateUpdated": "2024-11-19T16:55:11.908Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37088
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.771Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can write any content to any file." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:05:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37088", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can write any content to any file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37088", "datePublished": "2021-12-07T16:05:48", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.771Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22260
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.148Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has a UAF vulnerability.Successful exploitation of this vulnerability will affect data integrity and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:03:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22260", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel module has a UAF vulnerability.Successful exploitation of this vulnerability will affect data integrity and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UAF vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22260", "datePublished": "2022-05-13T15:03:30", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48361
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.762Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48361", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T16:13:22.931368Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-19T16:13:58.392Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Always On Display (AOD) has a path traversal vulnerability in theme files. Successful exploitation of this vulnerability may cause a failure in reading AOD theme resources." } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48361", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-19T16:13:58.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52359
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52359", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T12:51:19.654353Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-27T20:28:14.432Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.789Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission verification in some APIs in the ActivityTaskManagerService module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of permission verification in some APIs in the ActivityTaskManagerService module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:51:03.625Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52359", "datePublished": "2024-04-08T08:51:03.625Z", "dateReserved": "2024-01-26T06:51:31.233Z", "dateUpdated": "2025-03-27T20:28:14.432Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40004
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.166Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The cellular module has a vulnerability in permission management. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:29", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The cellular module has a vulnerability in permission management. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40004", "datePublished": "2022-01-07T22:39:29", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.166Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54112
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54112", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:21:04.293396Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:44:03.366Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cross-process screen stack vulnerability in the UIExtension module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T12:07:33.564Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54112", "datePublished": "2024-12-12T12:07:33.564Z", "dateReserved": "2024-11-29T02:34:46.791Z", "dateUpdated": "2024-12-12T15:44:03.366Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52105
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52105", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-27T15:16:57.198374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-27T15:23:13.538Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The nearby module has a privilege escalation vulnerability. Successful exploitation of this vulnerability may affect availability." } ], "value": "The nearby module has a privilege escalation vulnerability. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:24:52.058Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52105", "datePublished": "2024-01-16T09:24:52.058Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-08-27T15:23:13.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37082
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to motionhub crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Race Condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37082", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to motionhub crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race Condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37082", "datePublished": "2021-12-07T16:04:47", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44099
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of data verification errors in the kernel module. Successful exploitation of this vulnerability may cause WLAN interruption." } ], "value": "Vulnerability of data verification errors in the kernel module. Successful exploitation of this vulnerability may cause WLAN interruption." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:38:21.835Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44099", "datePublished": "2023-12-06T08:35:43.088Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-08-02T19:59:50.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34739
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.048Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings." } ], "problemTypes": [ { "descriptions": [ { "description": "Addition overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34739", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Addition overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34739", "datePublished": "2022-07-11T13:53:23", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.048Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1691
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-1691", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T20:32:10.146836Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T20:32:19.921Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:50:39.273Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1691", "datePublished": "2023-07-06T12:50:39.273Z", "dateReserved": "2023-03-29T09:29:47.827Z", "dateUpdated": "2024-11-20T20:32:19.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39980
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Telephony application has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could lead to sensitive information disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39980", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Telephony application has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could lead to sensitive information disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39980", "datePublished": "2022-01-03T21:07:25", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40061
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Type confusion vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40061", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Type confusion vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40061", "datePublished": "2022-03-07T13:49:40", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38983
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The BT Hfp Client module has a Use-After-Free (UAF) vulnerability.Successful exploitation of this vulnerability may result in arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38983", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22394
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.293Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22394", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22394", "datePublished": "2022-02-25T18:11:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42039
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42039", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:32:04.070540Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:32:13.990Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the SystemUI module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access control vulnerability in the SystemUI module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:35:23.145Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42039", "datePublished": "2024-09-04T01:35:23.145Z", "dateReserved": "2024-07-27T06:52:58.402Z", "dateUpdated": "2024-09-04T13:32:13.990Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46322
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46322", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T17:57:40.315486Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T18:19:25.040Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46322", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-16T18:19:25.040Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30418
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30418", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-22T15:01:21.403003Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-22T15:04:09.375Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of insufficient permission verification in the app management module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of insufficient permission verification in the app management module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:19:56.977Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30418", "datePublished": "2024-04-07T08:19:56.977Z", "dateReserved": "2024-03-27T03:38:10.315Z", "dateUpdated": "2024-08-22T15:04:09.375Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39974
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.242Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39974", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39974", "datePublished": "2022-01-03T21:07:44", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.242Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48605
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.572Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-48605", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:01:52.779080Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:07:53.562Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the fingerprint module. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability." } ], "value": "Input verification vulnerability in the fingerprint module. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:20:03.237Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48605", "datePublished": "2023-09-25T12:20:03.237Z", "dateReserved": "2023-08-28T12:36:11.353Z", "dateUpdated": "2024-09-24T15:07:53.562Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45441
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45441", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:27:38.331736Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:27:47.004Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the system service module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Input verification vulnerability in the system service module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:37:25.340Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45441", "datePublished": "2024-09-04T01:37:25.340Z", "dateReserved": "2024-08-29T06:19:14.881Z", "dateUpdated": "2024-09-04T13:27:47.004Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39004
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.491Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leak vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leak vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39004", "datePublished": "2022-09-16T17:56:03", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.491Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46892
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:43.023Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-46892", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T18:54:25.141339Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T18:54:36.635Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Encryption bypass vulnerability in Maintenance mode. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Encryption bypass vulnerability in Maintenance mode. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:41:21.742Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46892", "datePublished": "2023-07-06T12:41:21.742Z", "dateReserved": "2023-06-29T11:27:53.896Z", "dateUpdated": "2024-11-19T18:54:36.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52107
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.419Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52107", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T14:35:55.614449Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T14:36:28.905Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permissions being not strictly verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of permissions being not strictly verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:25:30.312Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52107", "datePublished": "2024-01-16T08:25:30.312Z", "dateReserved": "2023-12-27T02:33:17.231Z", "dateUpdated": "2024-08-29T14:36:28.905Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0116
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:02:43.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-0116", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-15T16:11:23.047136Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-15T16:11:57.198Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The reminder module lacks an authentication mechanism for broadcasts received. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-0116", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-01-09T00:00:00", "dateUpdated": "2025-01-15T16:11:57.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44114
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.830Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44114", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:04:31.739616Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:05:06.617Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds array vulnerability in the dataipa module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Out-of-bounds array vulnerability in the dataipa module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:00:14.247Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44114", "datePublished": "2023-10-11T12:00:14.247Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-18T15:05:06.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49244
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.420Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the multi-user module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission management vulnerability in the multi-user module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:58:41.728Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49244", "datePublished": "2023-12-06T08:58:41.728Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:45.420Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46893
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-46893", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T21:16:32.554168Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1284", "description": "CWE-1284 Improper Validation of Specified Quantity in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-20T21:17:52.091Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unstrict data verification and parameter check. Successful exploitation of this vulnerability may affect integrity." } ], "value": "Vulnerability of unstrict data verification and parameter check. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "unstrict data verification and parameter check", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T12:17:19.514Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46893", "datePublished": "2023-07-05T12:17:19.514Z", "dateReserved": "2023-06-29T11:27:53.897Z", "dateUpdated": "2024-11-20T21:17:52.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32991
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32991", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:50:35.572187Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:50:59.603Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.346Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the wpa_supplicant module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the wpa_supplicant module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:46:46.963Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32991", "datePublished": "2024-05-11T09:46:46.963Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.346Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22429
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22429", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22429", "datePublished": "2022-02-25T18:11:12", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54104
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54104", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T14:52:33.970013Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T14:52:52.578Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cross-process screen stack vulnerability in the UIExtension module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T11:58:15.918Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54104", "datePublished": "2024-12-12T11:58:15.918Z", "dateReserved": "2024-11-29T02:34:46.790Z", "dateUpdated": "2024-12-12T14:52:52.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39673
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39673", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T15:06:32.203031Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-25T15:06:52.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of serialisation/deserialisation mismatch in the iAware module. Impact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of serialisation/deserialisation mismatch in the iAware module. Impact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-26", "description": "CWE-26 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:40:24.640Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39673", "datePublished": "2024-07-25T11:40:24.640Z", "dateReserved": "2024-06-27T08:24:56.590Z", "dateUpdated": "2024-08-02T04:26:15.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44098
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.246Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44098", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T18:58:32.844989Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T18:59:04.570Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of missing encryption in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of missing encryption in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:02:05.173Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44098", "datePublished": "2023-11-08T09:02:05.173Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-04T18:59:04.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37064
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.818Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Limitation of a Pathname to a Restricted Directory vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to arbitrary file created." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Limitation of a Pathname to a Restricted Directory vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37064", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Limitation of a Pathname to a Restricted Directory vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to arbitrary file created." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Limitation of a Pathname to a Restricted Directory vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37064", "datePublished": "2021-12-07T16:02:55", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.818Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32992
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32992", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:50:11.792635Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:09.934Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.295Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient verification vulnerability in the baseband module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Insufficient verification vulnerability in the baseband module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:49:03.841Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32992", "datePublished": "2024-05-11T09:49:03.841Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.295Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37025
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:25:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37025", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37025", "datePublished": "2021-11-23T15:25:55", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37048
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to fake visitors to control PC,play a video,etc." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37048", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to fake visitors to control PC,play a video,etc." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37048", "datePublished": "2021-12-07T16:02:11", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39385
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.279Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39385", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:07:47.374173Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:08:18.847Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of configuration defects in the media module of certain products.. Successful exploitation of this vulnerability may cause unauthorized access." } ], "value": "Vulnerability of configuration defects in the media module of certain products.. Successful exploitation of this vulnerability may cause unauthorized access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:19:40.462Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39385", "datePublished": "2023-08-13T12:19:40.462Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:08:18.847Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42032
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42032", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T13:05:22.021292Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T13:10:34.518Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the Contacts module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the Contacts module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:05:15.059Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42032", "datePublished": "2024-08-08T09:05:15.059Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-08T13:10:34.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41583
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.316Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The storage maintenance and debugging module has an array out-of-bounds read vulnerability.Successful exploitation of this vulnerability will cause incorrect statistics of this module." } ], "problemTypes": [ { "descriptions": [ { "description": "Array out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41583", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.316Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56437
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56437", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T15:30:27.637209Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:30:45.304Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters not being verified in the widget framework module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of input parameters not being verified in the widget framework module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T02:01:27.893Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56437", "datePublished": "2025-01-08T02:01:27.893Z", "dateReserved": "2024-12-26T08:45:46.157Z", "dateUpdated": "2025-01-08T15:30:45.304Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46890
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-46890", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T21:21:18.342183Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T21:21:26.356Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "value": "Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T11:52:24.005Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46890", "datePublished": "2023-07-05T11:52:24.005Z", "dateReserved": "2023-06-29T11:27:53.896Z", "dateUpdated": "2024-11-20T21:21:26.356Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39972
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "MyHuawei-App has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could compromise confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39972", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MyHuawei-App has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could compromise confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39972", "datePublished": "2022-01-03T21:07:22", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30416
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30416", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-31T18:27:06.445639Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-31T18:27:35.333Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use After Free (UAF) vulnerability in the underlying driver module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Use After Free (UAF) vulnerability in the underlying driver module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:07:34.891Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30416", "datePublished": "2024-04-07T08:07:34.891Z", "dateReserved": "2024-03-27T03:38:10.314Z", "dateUpdated": "2024-08-02T01:32:07.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22463
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Use After Free vulnerability . Local attackers may exploit this vulnerability to cause Kernel Information disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "Use After Free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:32:35", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22463", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Use After Free vulnerability . Local attackers may exploit this vulnerability to cause Kernel Information disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22463", "datePublished": "2021-10-28T12:32:35", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37118
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.874Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwNearbyMain module has a Improper Handling of Exceptional Conditions vulnerability.Successful exploitation of this vulnerability may lead to message leak." } ], "problemTypes": [ { "descriptions": [ { "description": " Improper Handling of Exceptional Conditions", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37118", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwNearbyMain module has a Improper Handling of Exceptional Conditions vulnerability.Successful exploitation of this vulnerability may lead to message leak." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Improper Handling of Exceptional Conditions" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37118", "datePublished": "2022-01-03T21:07:33", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.874Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31760
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.204Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:03:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31760", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31760", "datePublished": "2022-06-13T15:03:55", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.204Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-9136
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-9136", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:08:07.478210Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:09:37.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the App Multiplier module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the App Multiplier module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:24:09.033Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-9136", "datePublished": "2024-09-27T10:24:09.033Z", "dateReserved": "2024-09-24T06:27:15.239Z", "dateUpdated": "2024-09-27T15:09:37.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48511
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.798Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48511", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T16:59:18.957457Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T16:59:27.754Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use After Free (UAF) vulnerability in the audio PCM driver module under special conditions. Successful exploitation of this vulnerability may cause audio features to perform abnormally." } ], "value": "Use After Free (UAF) vulnerability in the audio PCM driver module under special conditions. Successful exploitation of this vulnerability may cause audio features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:39:53.975Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48511", "datePublished": "2023-07-06T12:39:53.975Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-11-19T16:59:27.754Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39390
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39390", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T13:55:34.313756Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:00:16.996Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameter verification in certain APIs in the window management module. Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Vulnerability of input parameter verification in certain APIs in the window management module. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:24:06.704Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39390", "datePublished": "2023-08-13T12:24:06.704Z", "dateReserved": "2023-07-31T04:41:36.391Z", "dateUpdated": "2024-10-10T14:00:16.996Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52377
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52377", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:30:12.614245Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T20:03:59.310Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input data not being verified in the cellular data module.Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "value": "Vulnerability of input data not being verified in the cellular data module.Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:07:47.380Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52377", "datePublished": "2024-02-18T06:07:47.380Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-11-21T20:03:59.310Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44555
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44555", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T13:57:10.448842Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-294", "description": "CWE-294 Authentication Bypass by Capture-replay", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T13:59:37.193Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The DDMP/ODMF module has a service hijacking vulnerability. Successful exploit of this vulnerability may cause services to be unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Service hijacking vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44555", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T13:59:37.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39386
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39386", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:05:09.310273Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:06:08.131Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause newly installed apps to fail to restart." } ], "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause newly installed apps to fail to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:20:45.686Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39386", "datePublished": "2023-08-13T12:20:45.686Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:06:08.131Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40026
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.227Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40026", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40026", "datePublished": "2022-01-07T22:39:34", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.227Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44105
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44105", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T13:11:19.881014Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:11:26.607Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permissions not being strictly verified in the window management module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of permissions not being strictly verified in the window management module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:06:03.840Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44105", "datePublished": "2023-10-11T12:06:03.840Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-19T13:11:26.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51520
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51520", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T15:06:21.490974Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T15:06:31.865Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters not being verified in the HDC module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of input parameters not being verified in the HDC module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:10:45.930Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51520", "datePublished": "2024-11-05T09:10:45.930Z", "dateReserved": "2024-10-29T01:43:54.525Z", "dateUpdated": "2024-11-05T15:06:31.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52714
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.978Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52714", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T18:33:25.143460Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-657", "description": "CWE-657 Violation of Secure Design Principles", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T18:38:40.816Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of defects introduced in the design process in the hwnff module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of defects introduced in the design process in the hwnff module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:43:50.830Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52714", "datePublished": "2024-04-07T08:43:50.830Z", "dateReserved": "2024-03-27T03:37:42.326Z", "dateUpdated": "2024-08-14T18:38:40.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52554
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:21.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52554", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T18:12:54.929330Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T20:04:07.961Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the Bluetooth module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the Bluetooth module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:01:09.572Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52554", "datePublished": "2024-04-08T09:01:09.572Z", "dateReserved": "2024-02-27T03:41:51.383Z", "dateUpdated": "2024-11-05T20:04:07.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31762
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Input validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:54:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31762", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31762", "datePublished": "2022-06-13T14:56:38", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44096
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.821Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44096", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:35:45.799069Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:36:12.855Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": " Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:39:45.891Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44096", "datePublished": "2023-10-11T10:37:38.290Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:36:12.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37052
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.743Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Exception log vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exception log vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37052", "datePublished": "2021-12-08T14:12:30", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.743Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27896
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-27896", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T15:07:35.328241Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T15:10:27.763Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:41:55.757Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the log module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability can affect integrity." } ], "value": "Input verification vulnerability in the log module.\nImpact: Successful exploitation of this vulnerability can affect integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:24:17.171Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-27896", "datePublished": "2024-04-08T09:24:17.171Z", "dateReserved": "2024-02-27T03:43:01.541Z", "dateUpdated": "2024-11-29T15:10:27.763Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41312
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.968Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41312", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T17:42:24.301075Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T17:42:32.332Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause several apps to be activated automatically." } ], "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause several apps to be activated automatically." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:23:42.389Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41312", "datePublished": "2023-09-26T01:23:42.389Z", "dateReserved": "2023-08-28T12:17:09.167Z", "dateUpdated": "2024-09-24T17:42:32.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4566
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:31:06.623Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:47:38.075Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-4566", "datePublished": "2024-01-16T07:47:38.075Z", "dateReserved": "2023-08-28T12:19:16.087Z", "dateUpdated": "2024-08-02T07:31:06.623Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34735
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:52:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34735", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34735", "datePublished": "2022-07-11T13:52:53", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39399
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39399", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:26.308780Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:45:19.358Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-275", "description": "CWE-275 Permission Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:35:19.017Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39399", "datePublished": "2023-08-13T12:35:19.017Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-09T19:45:19.358Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37084
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious invoking other functions of the Smart Assistant through text messages." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:05:02", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37084", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious invoking other functions of the Smart Assistant through text messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37084", "datePublished": "2021-12-07T16:05:02", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37067
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.789Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality impacted." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:03:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37067", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality impacted." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37067", "datePublished": "2021-12-07T16:03:12", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37113
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.715Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37113", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37113", "datePublished": "2022-01-03T21:07:28", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.715Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38988
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38988", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38988", "datePublished": "2022-09-16T17:56:28", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37060
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.745Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to SAMGR Heap Address Leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37060", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to SAMGR Heap Address Leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37060", "datePublished": "2021-12-07T16:02:32", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.745Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37016
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.669Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause Information Disclosure or Denial of Service." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:22:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37016", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause Information Disclosure or Denial of Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37016", "datePublished": "2021-11-23T15:22:16", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38997
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38997", "datePublished": "2022-09-16T17:57:08", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40040
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.529Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Write data to arbitrary address vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:53:31", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Write data to arbitrary address vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40040", "datePublished": "2022-08-09T20:11:21", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.529Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22468
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability. Local attackers may exploit this vulnerability to cause kernel address leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:32:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22468", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability. Local attackers may exploit this vulnerability to cause kernel address leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22468", "datePublished": "2021-10-28T12:32:49", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34164
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.255Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34164", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:00:43.755323Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T17:00:51.220Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incomplete input parameter verification in the communication framework module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of incomplete input parameter verification in the communication framework module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:35:19.114Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34164", "datePublished": "2023-07-06T12:35:19.114Z", "dateReserved": "2023-05-29T09:03:29.119Z", "dateUpdated": "2024-11-19T17:00:51.220Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40009
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40009", "datePublished": "2022-01-07T22:39:33", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38978
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38978", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38978", "datePublished": "2022-09-16T17:56:37", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48301
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.699Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48301", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-24T20:35:34.883454Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-24T20:36:02.740Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The bundle management module lacks permission verification in some APIs. Successful exploitation of this vulnerability may restore the pre-installed apps that have been uninstalled." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48301", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-24T20:36:02.740Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22461
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Allocation of Resources Without Limits or Throttling vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:33:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22461", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Allocation of Resources Without Limits or Throttling vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Allocation of Resources Without Limits or Throttling" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22461", "datePublished": "2021-10-28T12:33:25", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.994Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54106
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54106", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:00:17.211310Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:00:26.436Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Null pointer dereference vulnerability in the image decoding module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Null pointer dereference vulnerability in the image decoding module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T12:00:52.526Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54106", "datePublished": "2024-12-12T12:00:52.526Z", "dateReserved": "2024-11-29T02:34:46.790Z", "dateUpdated": "2024-12-12T15:00:26.436Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leak vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leak vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39005", "datePublished": "2022-09-16T17:56:07", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45445
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45445", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:13:22.524221Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:13:31.811Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of resources not being closed or released in the keystore module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of resources not being closed or released in the keystore module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-459", "description": "CWE-459 Incomplete Cleanup", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:54:26.309Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45445", "datePublished": "2024-09-04T01:54:26.309Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:13:31.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39380
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39380", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:22:05.018130Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:24:16.891Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause audio devices to perform abnormally." } ], "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause audio devices to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:39:45.292Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39380", "datePublished": "2023-08-13T11:39:45.292Z", "dateReserved": "2023-07-31T04:41:32.210Z", "dateUpdated": "2024-10-10T14:24:16.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41294
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.191Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41294", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:21:00.897014Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:23:07.460Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The DP module has a service hijacking vulnerability.Successful exploitation of this vulnerability may affect some Super Device services." } ], "value": "The DP module has a service hijacking vulnerability.Successful exploitation of this vulnerability may affect some Super Device services." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T11:00:34.076Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41294", "datePublished": "2023-09-25T11:00:34.076Z", "dateReserved": "2023-08-28T12:17:07.353Z", "dateUpdated": "2024-09-24T15:23:07.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52540
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52540", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T15:03:42.318285Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-28T20:40:12.716Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.622Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper authentication in the Iaware module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of improper authentication in the Iaware module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:46:23.790Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52540", "datePublished": "2024-04-08T08:46:23.790Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2025-03-28T20:40:12.716Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40014
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.472Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.\u003c/p\u003e" } ], "value": "The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Information Management Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T13:06:11.966Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40014", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40014", "datePublished": "2022-01-07T22:39:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.472Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37071
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.883Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Business Logic Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to persistent dos." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:03:52", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37071", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Business Logic Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to persistent dos." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Business Logic Errors vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37071", "datePublished": "2021-12-07T16:03:52", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.883Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22261
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:03:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22261", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstrict verification vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22261", "datePublished": "2022-05-13T15:03:44", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39408
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39408", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T14:20:43.725122Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T14:21:17.517Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T08:51:09.991Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39408", "datePublished": "2023-09-25T08:51:09.991Z", "dateReserved": "2023-07-31T04:41:37.871Z", "dateUpdated": "2024-09-24T14:21:17.517Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40038
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.198Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Double free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40038", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double free" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40038", "datePublished": "2022-01-07T22:39:38", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41596
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-41596", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T18:19:42.450516Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T18:22:04.785Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The system tool has inconsistent serialization and deserialization. Successful exploitation of this vulnerability will cause unauthorized startup of components." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41596", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-09-27T00:00:00.000Z", "dateUpdated": "2025-04-16T18:22:04.785Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37003
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission assignment vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission assignment vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37003", "datePublished": "2022-08-09T20:10:59", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46312
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:46.668Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-46312", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T18:45:41.439247Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T18:46:28.548Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The application management module has a vulnerability in permission verification. Successful exploitation of this vulnerability causes unexpected clear of device applications." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46312", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-17T18:46:28.548Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22460
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to bypass the control mechanism." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient Verification of Data Authenticity", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:29", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22460", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to bypass the control mechanism." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient Verification of Data Authenticity" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22460", "datePublished": "2021-10-28T12:31:29", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37073
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the detection result is tampered with." } ], "problemTypes": [ { "descriptions": [ { "description": "Race Condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:02", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37073", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the detection result is tampered with." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race Condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37073", "datePublished": "2021-12-07T16:04:02", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.754Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37050
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.742Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing sensitive data encryption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:20", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37050", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing sensitive data encryption vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37050", "datePublished": "2021-12-08T14:12:20", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.742Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51521
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51521", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T15:05:24.549536Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T15:06:11.788Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input parameter verification vulnerability in the background service module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Input parameter verification vulnerability in the background service module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:12:16.946Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51521", "datePublished": "2024-11-05T09:12:16.946Z", "dateReserved": "2024-10-29T01:43:54.525Z", "dateUpdated": "2024-11-05T15:06:11.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46767
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46767", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:27:13.516034Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:28:35.104Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:27:46.514Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46767", "datePublished": "2023-11-08T09:27:46.514Z", "dateReserved": "2023-10-26T11:33:04.518Z", "dateUpdated": "2024-09-04T19:28:35.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54097
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54097", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:22:24.038540Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:22:50.608Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Security vulnerability in the HiView module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect feature implementation and integrity." } ], "value": "Security vulnerability in the HiView module\nImpact: Successful exploitation of this vulnerability may affect feature implementation and integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-15", "description": "CWE-15 External Control of System or Configuration Setting", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T11:11:58.118Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54097", "datePublished": "2024-12-12T11:11:58.118Z", "dateReserved": "2024-11-29T02:34:46.789Z", "dateUpdated": "2024-12-12T15:22:50.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56454
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56454", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T14:44:21.154796Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T14:44:27.964Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T03:21:46.204Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56454", "datePublished": "2025-01-08T03:21:46.204Z", "dateReserved": "2024-12-26T08:45:46.160Z", "dateUpdated": "2025-01-08T14:44:27.964Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31759
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Accessing uninitialized pointers vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:56:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31759", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Accessing uninitialized pointers vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31759", "datePublished": "2022-06-13T14:56:25", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39977
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": " NULL Pointer Dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39977", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39977", "datePublished": "2022-01-03T21:07:34", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46318
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46318", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T18:11:02.989643Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T18:21:10.972Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HAware module has a function logic error. Successful exploitation of this vulnerability will affect the account removal function in Settings." } ], "problemTypes": [ { "descriptions": [ { "description": "Function logic error vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46318", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-16T18:21:10.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37007
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.662Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:21:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37007", "datePublished": "2021-11-23T15:21:56", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44548
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.556Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44548", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T15:06:30.414163Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T15:06:59.522Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability in permission verification during the Bluetooth pairing process. Successful exploitation of this vulnerability may cause the dialog box for confirming the pairing not to be displayed during Bluetooth pairing." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44548", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T15:06:59.522Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46787
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:02:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46787", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46787", "datePublished": "2022-05-13T15:02:34", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-04T05:17:42.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41578
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.978Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has an out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause root privilege escalation attacks implemented by modifying program information." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41578", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49241
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "API permission control vulnerability in the network management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "API permission control vulnerability in the network management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:48:18.923Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49241", "datePublished": "2023-12-06T08:48:18.923Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:44.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46836
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Information leakage vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46836", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information leakage vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46836", "datePublished": "2022-09-16T17:55:42", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-04T05:17:42.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52717
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52717", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T19:17:39.146898Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T19:56:31.550Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.113Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the lock screen module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the lock screen module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T09:03:06.815Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52717", "datePublished": "2024-04-07T09:03:06.815Z", "dateReserved": "2024-03-27T03:37:42.326Z", "dateUpdated": "2024-11-18T19:56:31.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40001
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40001", "datePublished": "2022-01-07T22:39:26", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22471
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash." } ], "problemTypes": [ { "descriptions": [ { "description": "NULL Pointer Dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:33:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22471", "datePublished": "2021-10-28T12:33:39", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58049
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58049", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:11:19.011263Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T15:11:40.952Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the media library module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission verification vulnerability in the media library module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T07:20:00.112Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58049", "datePublished": "2025-03-04T07:20:00.112Z", "dateReserved": "2025-02-27T02:29:09.225Z", "dateUpdated": "2025-03-04T15:11:40.952Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39009
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39009", "datePublished": "2022-09-16T17:57:50", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41597
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41597", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39006
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39006", "datePublished": "2022-09-16T17:55:56", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56452
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56452", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T15:13:27.637715Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:13:35.092Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T03:17:19.704Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56452", "datePublished": "2025-01-08T03:17:19.704Z", "dateReserved": "2024-12-26T08:45:46.159Z", "dateUpdated": "2025-01-08T15:13:35.092Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1696
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-1696", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-21T16:59:58.923951Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-203", "description": "CWE-203 Observable Discrepancy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-21T17:02:03.357Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The multimedia video module has a vulnerability in data processing.Successful exploitation of this vulnerability may affect availability." } ], "value": "The multimedia video module has a vulnerability in data processing.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-20T14:15:55.847Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1696", "datePublished": "2023-05-20T14:15:55.847Z", "dateReserved": "2023-03-29T09:29:54.744Z", "dateUpdated": "2025-01-21T17:02:03.357Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44556
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44556", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T18:05:01.751843Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T18:05:30.614Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 12.0.0" } ] }, { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "HarmonyOS 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMissing parameter type validation in the DRM module. Successful exploitation of this vulnerability may affect availability.\u003c/p\u003e" } ], "value": "Missing parameter type validation in the DRM module. Successful exploitation of this vulnerability may affect availability.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Type Conversion or Cast", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-26T12:59:51.447Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44556", "datePublished": "2022-11-08T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T18:05:30.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37132
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:16:03.633Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "PackageManagerService has a Permissions, Privileges, and Access Controls vulnerability .Successful exploitation of this vulnerability may cause that Third-party apps can obtain the complete list of Harmony apps without permission." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:18", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37132", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PackageManagerService has a Permissions, Privileges, and Access Controls vulnerability .Successful exploitation of this vulnerability may cause that Third-party apps can obtain the complete list of Harmony apps without permission." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permissions, Privileges, and Access Controls" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37132", "datePublished": "2022-01-03T21:07:18", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:16:03.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41590
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-41590", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T18:23:17.923095Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T18:26:07.570Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have authentication-related (including session management) vulnerabilities as the setup wizard is bypassed. Successful exploitation of this vulnerability affects the smartphone availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication-related vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41590", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-09-27T00:00:00.000Z", "dateUpdated": "2025-04-16T18:26:07.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1692
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:25.092Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-1692", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-21T17:08:59.058326Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-21T17:10:05.010Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The window management module lacks permission verification.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The window management module lacks permission verification.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-20T14:10:55.121Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1692", "datePublished": "2023-05-20T14:10:55.121Z", "dateReserved": "2023-03-29T09:29:50.057Z", "dateUpdated": "2025-01-21T17:10:05.010Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-57955
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-57955", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T13:56:06.333110Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T19:51:09.874Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Arbitrary write vulnerability in the Gallery module \u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Arbitrary write vulnerability in the Gallery module \nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T12:25:22.348Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/2/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-57955", "datePublished": "2025-02-06T12:25:22.348Z", "dateReserved": "2025-01-22T03:37:52.394Z", "dateUpdated": "2025-02-12T19:51:09.874Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44110
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.826Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44110", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:08:40.262680Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:08:57.208Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds access vulnerability in the audio module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Out-of-bounds access vulnerability in the audio module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:57:43.178Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44110", "datePublished": "2023-10-11T11:57:43.178Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-18T15:08:57.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22258
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.176Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Wi-Fi module has an event notification vulnerability.Successful exploitation of this vulnerability may allow third-party applications to intercept event notifications and add information and result in elevation-of-privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "Event notification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:15:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22258", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Wi-Fi module has an event notification vulnerability.Successful exploitation of this vulnerability may allow third-party applications to intercept event notifications and add information and result in elevation-of-privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Event notification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22258", "datePublished": "2022-04-11T19:38:18", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.176Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48352
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.762Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48352", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-24T15:01:53.338300Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-665", "description": "CWE-665 Improper Initialization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-24T15:05:24.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have data initialization issues. Successful exploitation of this vulnerability may cause a system panic." } ], "problemTypes": [ { "descriptions": [ { "description": "Data initialization vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48352", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-24T15:05:24.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41299
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.074Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41299", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T16:01:53.745952Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T16:02:14.524Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T11:41:44.258Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41299", "datePublished": "2023-09-25T11:41:44.258Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T16:02:14.524Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51526
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51526", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T15:35:41.013633Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T15:35:52.114Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the hidebug module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the hidebug module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:23:37.762Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51526", "datePublished": "2024-11-05T09:23:37.762Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T15:35:52.114Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58125
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58125", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:39:13.505224Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T14:10:29.880Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.3.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the security verification module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "value": "Access control vulnerability in the security verification module\nImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:43:00.444Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58125", "datePublished": "2025-04-07T03:43:00.444Z", "dateReserved": "2025-03-27T07:13:48.464Z", "dateUpdated": "2025-04-07T14:10:29.880Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42031
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-42031", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T15:24:44.947651Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-19T15:56:45.958Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the Settings module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the Settings module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:02:51.806Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42031", "datePublished": "2024-08-08T08:56:57.339Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2025-03-19T15:56:45.958Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46758
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46758", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:31:06.737289Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:32:13.777Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the multi-screen interaction module. Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "value": "Permission management vulnerability in the multi-screen interaction module. Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-09T07:51:25.463Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46758", "datePublished": "2023-11-08T10:18:22.152Z", "dateReserved": "2023-10-26T11:32:55.336Z", "dateUpdated": "2024-09-04T14:32:13.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48313
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.688Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48313", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T16:32:36.974638Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639 Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T16:32:45.227Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-16T07:07:28.234Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48313", "datePublished": "2023-04-16T07:07:28.234Z", "dateReserved": "2023-02-06T03:32:29.062Z", "dateUpdated": "2025-02-06T16:32:45.227Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32993
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32993", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:49:49.403661Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:35.296Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.477Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds access vulnerability in the memory module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Out-of-bounds access vulnerability in the memory module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:56:03.872Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32993", "datePublished": "2024-05-11T09:56:03.872Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58127
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58127", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:39:07.642669Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T14:10:13.844Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.3.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the security verification module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "value": "Access control vulnerability in the security verification module\nImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:48:36.633Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58127", "datePublished": "2025-04-07T03:48:36.633Z", "dateReserved": "2025-03-27T07:13:48.464Z", "dateUpdated": "2025-04-07T14:10:13.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37119
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37119", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37119", "datePublished": "2022-01-03T21:07:30", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37092
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete Cleanup vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37092", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incomplete Cleanup vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37092", "datePublished": "2021-12-08T14:13:05", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44560
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.920Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44560", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T13:48:21.051895Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T13:49:32.389Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The launcher module has an Intent redirection vulnerability. Successful exploitation of this vulnerability may cause launcher module data to be modified." } ], "problemTypes": [ { "descriptions": [ { "description": "Intent redirection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44560", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T13:49:32.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46774
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.328Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46774", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:14:01.196769Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:19:38.453Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of uncaught exceptions in the NFC module. Successful exploitation of this vulnerability can affect NFC availability." } ], "value": "Vulnerability of uncaught exceptions in the NFC module. Successful exploitation of this vulnerability can affect NFC availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:12:36.859Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46774", "datePublished": "2023-11-08T09:12:36.859Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T19:19:38.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51522
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51522", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T15:05:04.224024Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T15:05:11.844Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper device information processing in the device management module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of improper device information processing in the device management module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-199", "description": "CWE-199 Information Management Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:13:41.926Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51522", "datePublished": "2024-11-05T09:13:41.926Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T15:05:11.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39392
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39392", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:30:49.934527Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:31:21.691Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of insecure signatures in the OsuLogin module. Successful exploitation of this vulnerability may cause OsuLogin to be maliciously modified and overwritten." } ], "value": "Vulnerability of insecure signatures in the OsuLogin module. Successful exploitation of this vulnerability may cause OsuLogin to be maliciously modified and overwritten." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:33:13.167Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39392", "datePublished": "2023-08-13T11:33:13.167Z", "dateReserved": "2023-07-31T04:41:36.391Z", "dateUpdated": "2024-10-10T14:31:21.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37045
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UAF vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37045", "datePublished": "2021-12-08T14:12:07", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48288
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.052Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48288", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-24T20:43:51.238726Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-24T20:44:11.768Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48288", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-24T20:44:11.768Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54113
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54113", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:21:01.903672Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:43:56.889Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Process residence vulnerability in abnormal scenarios in the print module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect power consumption." } ], "value": "Process residence vulnerability in abnormal scenarios in the print module\nImpact: Successful exploitation of this vulnerability may affect power consumption." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T12:09:20.044Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54113", "datePublished": "2024-12-12T12:09:20.044Z", "dateReserved": "2024-11-29T02:34:46.791Z", "dateUpdated": "2024-12-12T15:43:56.889Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39981
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Chang Lian application has a vulnerability which can be maliciously exploited to hide the calling number.Successful exploitation of this vulnerability allows you to make an anonymous call." } ], "problemTypes": [ { "descriptions": [ { "description": " Security Features", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39981", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Chang Lian application has a vulnerability which can be maliciously exploited to hide the calling number.Successful exploitation of this vulnerability allows you to make an anonymous call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Security Features" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39981", "datePublished": "2022-01-03T21:07:25", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-31173
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31173", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:38:58.577575Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T14:09:37.706Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory write permission bypass vulnerability in the kernel futex module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Memory write permission bypass vulnerability in the kernel futex module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:56:19.969Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2025-31173", "datePublished": "2025-04-07T03:56:19.969Z", "dateReserved": "2025-03-27T07:14:14.770Z", "dateUpdated": "2025-04-07T14:09:37.706Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52544
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52544", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-31T19:27:33.584526Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-04T14:37:45.737Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.880Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of file path verification being bypassed in the email module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of file path verification being bypassed in the email module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:52:13.485Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52544", "datePublished": "2024-04-08T08:52:13.485Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-11-04T14:37:45.737Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44111
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44111", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:05:50.005560Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:06:27.540Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:59:01.687Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44111", "datePublished": "2023-10-11T11:59:01.687Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-18T15:06:27.540Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39401
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39401", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:24.099297Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:34:41.355Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:37:40.608Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39401", "datePublished": "2023-08-13T12:37:40.608Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T19:34:41.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29791
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.679Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:04:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29791", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstrict verification vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29791", "datePublished": "2022-05-13T15:04:30", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.679Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37044
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.792Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37044", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37044", "datePublished": "2021-12-08T14:12:01", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.792Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37117
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.854Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:29", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37117", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37117", "datePublished": "2022-01-03T21:07:29", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48351
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48351", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-24T17:44:07.823761Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-24T17:45:11.969Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48351", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-24T17:45:11.969Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39975
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Hilinksvc has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause denial of service attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39975", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Hilinksvc has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause denial of service attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Processing Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39975", "datePublished": "2022-01-03T21:07:22", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52953
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52953", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T15:29:47.173294Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:30:01.163Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Path traversal vulnerability in the Medialibrary module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "value": "Path traversal vulnerability in the Medialibrary module\nImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T01:48:23.333Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52953", "datePublished": "2025-01-08T01:48:23.333Z", "dateReserved": "2024-12-26T08:46:15.801Z", "dateUpdated": "2025-01-08T15:30:01.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22456
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.365Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22456", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Processing Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22456", "datePublished": "2021-10-28T12:31:47", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.365Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40032
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality.\u003c/p\u003e" } ], "value": "The bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Information Management Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T13:05:00.909Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40032", "datePublished": "2022-01-07T22:39:47", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37125
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.814Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause confidentiality is affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37125", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause confidentiality is affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37125", "datePublished": "2022-01-03T21:07:16", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.814Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40052
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect buffer size calculation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:12:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect buffer size calculation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40052", "datePublished": "2022-03-07T13:50:35", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46891
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.840Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-46891", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T21:20:48.627152Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T21:20:57.345Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "value": "Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T12:15:51.878Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46891", "datePublished": "2023-07-05T12:15:51.878Z", "dateReserved": "2023-06-29T11:27:53.896Z", "dateUpdated": "2024-11-20T21:20:57.345Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48298
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:58.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48298", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-25T13:28:09.671152Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1284", "description": "CWE-1284 Improper Validation of Specified Quantity in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T13:28:48.770Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The geofencing kernel code does not verify the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48298", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-25T13:28:48.770Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39007
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission verification bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39007", "datePublished": "2022-09-16T17:57:45", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37022
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause root permission which can be escalated." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:26:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37022", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause root permission which can be escalated." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37022", "datePublished": "2021-11-23T15:26:49", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51513
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51513", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:42:32.743289Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:49.262Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of processes not being fully terminated in the VPN module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect power consumption." } ], "value": "Vulnerability of processes not being fully terminated in the VPN module\nImpact: Successful exploitation of this vulnerability will affect power consumption." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:42:57.062Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51513", "datePublished": "2024-11-05T08:42:57.062Z", "dateReserved": "2024-10-29T01:43:54.524Z", "dateUpdated": "2024-11-05T14:53:49.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37054
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Identity spoofing and authentication bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37054", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Identity spoofing and authentication bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37054", "datePublished": "2021-12-08T14:12:42", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58110
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58110", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:30:56.244744Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T13:31:05.161Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the codec module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Buffer overflow vulnerability in the codec module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:36:06.556Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58110", "datePublished": "2025-04-07T03:36:06.556Z", "dateReserved": "2025-03-27T07:13:48.462Z", "dateUpdated": "2025-04-07T13:31:05.161Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52383
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52383", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:53:54.558902Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:38.176Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Double-free vulnerability in the RSMC module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Double-free vulnerability in the RSMC module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "CWE-415 Double Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:52:36.457Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52383", "datePublished": "2024-05-11T09:52:36.457Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-08-02T22:55:41.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46757
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.610Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46757", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:33:54.599385Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:34:24.081Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The remote PIN module has a vulnerability that causes incorrect information storage locations.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The remote PIN module has a vulnerability that causes incorrect information storage locations.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-09T07:50:55.380Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46757", "datePublished": "2023-11-08T10:13:49.070Z", "dateReserved": "2023-10-26T11:32:55.336Z", "dateUpdated": "2024-09-04T14:34:24.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54111
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54111", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:02:38.079603Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:02:45.095Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Read/Write vulnerability in the image decoding module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Read/Write vulnerability in the image decoding module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345 Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T12:06:25.502Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54111", "datePublished": "2024-12-12T12:06:25.502Z", "dateReserved": "2024-11-29T02:34:46.791Z", "dateUpdated": "2024-12-12T15:02:45.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48349
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.753Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48349", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-24T19:07:25.827805Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-24T19:08:56.212Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The control component has a spoofing vulnerability. Successful exploitation of this vulnerability may affect confidentiality and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Spoofing vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48349", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-24T19:08:56.212Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48520
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.841Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48520", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T16:52:07.006655Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T16:52:18.687Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:55:24.026Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48520", "datePublished": "2023-07-06T12:55:24.026Z", "dateReserved": "2023-06-29T11:26:45.309Z", "dateUpdated": "2024-11-19T16:52:18.687Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39393
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39393", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:29:25.730418Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:30:08.867Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of insecure signatures in the ServiceWifiResources module. Successful exploitation of this vulnerability may cause ServiceWifiResources to be maliciously modified and overwritten." } ], "value": "Vulnerability of insecure signatures in the ServiceWifiResources module. Successful exploitation of this vulnerability may cause ServiceWifiResources to be maliciously modified and overwritten." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:34:33.081Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39393", "datePublished": "2023-08-13T11:34:33.081Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-10T14:30:08.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51518
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-51518", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T17:14:51.854825Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T17:15:46.262Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of message types not being verified in the advanced messaging modul\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of message types not being verified in the advanced messaging modul\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:08:46.445Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51518", "datePublished": "2024-11-05T09:08:46.445Z", "dateReserved": "2024-10-29T01:43:54.525Z", "dateUpdated": "2024-11-05T17:15:46.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40034
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory overwriting vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:14", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40034", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory overwriting vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40034", "datePublished": "2022-08-09T20:10:14", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.218Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41577
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel server has a vulnerability of not verifying the length of the data transferred in the user space.Successful exploitation of this vulnerability may cause out-of-bounds read in the kernel, which affects the device confidentiality and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41577", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48350
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.745Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48350", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-24T17:47:50.889383Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-24T17:48:00.999Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HUAWEI Messaging app has a vulnerability of unauthorized file access. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized file access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48350", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-24T17:48:00.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56447
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56447", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T14:45:34.967752Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T14:45:43.328Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission control in the window management module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of improper permission control in the window management module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T03:03:11.490Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56447", "datePublished": "2025-01-08T03:03:11.490Z", "dateReserved": "2024-12-26T08:45:46.159Z", "dateUpdated": "2025-01-08T14:45:43.328Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45450
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45450", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:32:39.711690Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:32:51.043Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the software update module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the software update module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:15:38.783Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45450", "datePublished": "2024-09-04T01:15:26.814Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:32:51.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56453
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56453", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T15:21:13.891665Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:21:45.591Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T03:18:32.152Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56453", "datePublished": "2025-01-08T03:18:32.152Z", "dateReserved": "2024-12-26T08:45:46.160Z", "dateUpdated": "2025-01-08T15:21:45.591Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52370
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52370", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T15:28:38.235755Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-24T15:09:07.185Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.516Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Stack overflow vulnerability in the network acceleration module.Successful exploitation of this vulnerability may cause unauthorized file access." } ], "value": "Stack overflow vulnerability in the network acceleration module.Successful exploitation of this vulnerability may cause unauthorized file access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:41:29.209Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52370", "datePublished": "2024-02-18T03:41:29.209Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2025-04-24T15:09:07.185Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41302
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.973Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41302", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:13:33.968642Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:14:54.104Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Redirection permission verification vulnerability in the home screen module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Redirection permission verification vulnerability in the home screen module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:16:12.190Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41302", "datePublished": "2023-09-25T12:16:12.190Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T15:14:54.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48287
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48287", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-24T20:44:54.487226Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-24T20:45:30.269Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwContacts module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48287", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-24T20:45:30.269Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40003
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.191Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "HwPCAssistant has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HwPCAssistant has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40003", "datePublished": "2022-01-07T22:39:28", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.191Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44550
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44550", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T14:08:33.384970Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T14:10:02.293Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The graphics display module has a UAF vulnerability when traversing graphic layers. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44550", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T14:10:02.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37049
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.723Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37049", "datePublished": "2021-12-08T14:12:15", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.723Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40018
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.444Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The eID module has a null pointer reference vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Null Pointer Reference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40018", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The eID module has a null pointer reference vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null Pointer Reference" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40018", "datePublished": "2022-01-07T22:39:42", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56456
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56456", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T14:43:10.106202Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T14:43:17.604Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T03:23:40.211Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56456", "datePublished": "2025-01-08T03:23:40.211Z", "dateReserved": "2024-12-26T08:45:46.160Z", "dateUpdated": "2025-01-08T14:43:17.604Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48517
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.513Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48517", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T16:57:51.327720Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T16:58:04.440Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized service access vulnerability in the DSoftBus module. Successful exploitation of this vulnerability will affect availability." } ], "value": "Unauthorized service access vulnerability in the DSoftBus module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:48:51.135Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48517", "datePublished": "2023-07-06T12:48:51.135Z", "dateReserved": "2023-06-29T11:23:50.334Z", "dateUpdated": "2024-11-19T16:58:04.440Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30413
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30413", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T21:08:21.415115Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-28T19:36:04.127Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.291Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission control in the window management module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:03:09.240Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30413", "datePublished": "2024-04-07T08:03:09.240Z", "dateReserved": "2024-03-27T03:38:10.314Z", "dateUpdated": "2025-03-28T19:36:04.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54102
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54102", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T14:51:43.767419Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T14:51:57.063Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" }, { "status": "affected", "version": "4.2.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the DDR module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Race condition vulnerability in the DDR module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T11:41:28.904Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54102", "datePublished": "2024-12-12T11:41:28.904Z", "dateReserved": "2024-11-29T02:34:46.790Z", "dateUpdated": "2024-12-12T14:51:57.063Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37128
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "HwPCAssistant has a Path Traversal vulnerability .Successful exploitation of this vulnerability may write any file." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HwPCAssistant has a Path Traversal vulnerability .Successful exploitation of this vulnerability may write any file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37128", "datePublished": "2022-01-03T21:07:17", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.754Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41582
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.062Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The security module has configuration defects.Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41582", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.062Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37238
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:33.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37238", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:03:21.157972Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T17:03:28.687Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of apps\u0027 permission to access a certain API being incompletely verified in the wireless projection module. Successful exploitation of this vulnerability may affect some wireless projection features." } ], "value": "Vulnerability of apps\u0027 permission to access a certain API being incompletely verified in the wireless projection module. Successful exploitation of this vulnerability may affect some wireless projection features." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-275", "description": "CWE-275 Permission Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:26:28.737Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37238", "datePublished": "2023-07-06T12:26:28.737Z", "dateReserved": "2023-06-29T10:23:01.713Z", "dateUpdated": "2024-11-19T17:03:28.687Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34740
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.234Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34740", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34740", "datePublished": "2022-07-11T13:53:10", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.234Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52364
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52364", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T17:22:28.968203Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-01T17:49:02.979Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.682Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the RSMC module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause out-of-bounds write." } ], "value": "Vulnerability of input parameters being not strictly verified in the RSMC module.\nImpact: Successful exploitation of this vulnerability may cause out-of-bounds write." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:21:32.876Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52364", "datePublished": "2024-04-08T09:21:32.876Z", "dateReserved": "2024-01-26T06:51:31.234Z", "dateUpdated": "2024-11-01T17:49:02.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41310
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41310", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T18:48:13.867695Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T18:48:23.529Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background." } ], "value": "Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:20:44.416Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41310", "datePublished": "2023-09-26T01:20:44.416Z", "dateReserved": "2023-08-28T12:17:09.167Z", "dateUpdated": "2024-09-24T18:48:23.529Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22425
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevating Privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Double Free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:20:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22425", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevating Privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22425", "datePublished": "2021-08-03T17:20:00", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22426
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22426", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22426", "datePublished": "2022-02-25T18:11:10", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41588
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.233Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The home screen module has a vulnerability in service logic processing.Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic exception vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41588", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48354
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.866Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48354", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-20T15:31:30.634879Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-20T15:31:38.339Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has a heap out-of-bounds write vulnerability. Successful exploitation of this vulnerability can cause the Bluetooth process to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48354", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-20T15:31:38.339Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-26547
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:53:54.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-26547", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T15:44:32.380299Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-19T15:44:57.288Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The InputMethod module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-26547", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-19T15:44:57.288Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46768
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46768", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:58:05.239312Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:58:19.576Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multi-thread vulnerability in the idmap module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Multi-thread vulnerability in the idmap module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T02:51:12.992Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46768", "datePublished": "2023-11-08T02:51:12.992Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T14:58:19.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52369
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52369", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T18:52:30.707849Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T18:32:43.406Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Stack overflow vulnerability in the NFC module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "value": "Stack overflow vulnerability in the NFC module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:39:56.203Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52369", "datePublished": "2024-02-18T03:39:56.203Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2025-03-25T18:32:43.406Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6273
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:28:20.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-6273", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-17T20:51:10.909348Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T18:31:23.836Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the module for disabling Sound Booster. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Permission management vulnerability in the module for disabling Sound Booster. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:07:24.345Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-6273", "datePublished": "2023-12-06T09:07:24.345Z", "dateReserved": "2023-11-24T07:33:43.681Z", "dateUpdated": "2024-10-10T18:31:23.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58045
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58045", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:27:46.763395Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:28:35.662Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multi-concurrency vulnerability in the media digital copyright protection module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Multi-concurrency vulnerability in the media digital copyright protection module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T07:15:38.953Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58045", "datePublished": "2025-03-04T07:15:38.953Z", "dateReserved": "2025-02-27T02:29:09.224Z", "dateUpdated": "2025-03-04T14:28:35.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22418
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.300Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:21:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22418", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22418", "datePublished": "2021-08-03T17:21:08", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.300Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37007
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37007", "datePublished": "2022-08-09T20:10:24", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52954
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52954", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T15:29:26.935683Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:29:35.308Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission control in the Gallery module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of improper permission control in the Gallery module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T01:51:55.588Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52954", "datePublished": "2025-01-08T01:51:55.588Z", "dateReserved": "2024-12-26T08:46:15.801Z", "dateUpdated": "2025-01-08T15:29:35.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-57959
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-57959", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T14:35:16.104499Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-06T14:35:27.060Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" }, { "status": "affected", "version": "4.3.0" }, { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use-After-Free (UAF) vulnerability in the display module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Use-After-Free (UAF) vulnerability in the display module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T12:31:09.281Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/2/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-57959", "datePublished": "2025-02-06T12:31:09.281Z", "dateReserved": "2025-01-22T03:37:52.395Z", "dateUpdated": "2025-02-06T14:35:27.060Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46883
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46883", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-16T16:47:34.794115Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-16T16:47:38.524Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46883", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2025-01-16T16:47:38.524Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37006
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0,HarmonyOS 2.1" }, { "status": "affected", "version": "EMUI 12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:53:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0,HarmonyOS 2.1" }, { "version_value": "EMUI 12.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37006", "datePublished": "2022-08-09T20:11:35", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34156
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.248Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34156", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-17T15:18:31.270003Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-384", "description": "CWE-384 Session Fixation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-17T15:23:28.861Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of services denied by early fingerprint APIs on HarmonyOS products.Successful exploitation of this vulnerability may cause services to be denied." } ], "problemTypes": [ { "descriptions": [ { "description": "Services denied", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34156", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-17T15:23:28.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48507
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.766Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48507", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T20:35:37.360087Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T20:35:47.690Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of identity verification being bypassed in the storage module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of identity verification being bypassed in the storage module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-294", "description": "CWE-294 Authentication Bypass by Capture-replay", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:36:59.628Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48507", "datePublished": "2023-07-06T12:36:59.628Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-11-20T20:35:47.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40015
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": " EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40015", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": " EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40015", "datePublished": "2022-02-09T22:03:57", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37068
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.791Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Resource Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of Service Attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "Resource Management Errors vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:03:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37068", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Resource Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of Service Attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Resource Management Errors vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37068", "datePublished": "2021-12-07T16:03:42", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.791Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54103
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54103", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T14:52:12.498007Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T14:52:22.287Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper access control in the album module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of improper access control in the album module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T11:57:15.877Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54103", "datePublished": "2024-12-12T11:57:15.877Z", "dateReserved": "2024-11-29T02:34:46.790Z", "dateUpdated": "2024-12-12T14:52:22.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39969
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized file access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39969", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized file access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39969", "datePublished": "2022-01-03T21:07:42", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.329Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39389
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.308Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39389", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:33:03.841704Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1285", "description": "CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:37:21.887Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause home screen unavailability." } ], "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause home screen unavailability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:30:51.872Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39389", "datePublished": "2023-08-13T11:30:51.872Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:37:21.887Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42036
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42036", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T14:02:31.386988Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T14:02:40.553Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the Notepad module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the Notepad module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:28:19.295Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42036", "datePublished": "2024-08-08T09:28:19.295Z", "dateReserved": "2024-07-27T06:52:58.401Z", "dateUpdated": "2024-08-08T14:02:40.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37080
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.848Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete Cleanup vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37080", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incomplete Cleanup vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37080", "datePublished": "2021-12-07T16:04:32", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.848Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48508
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48508", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T14:12:28.896241Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T14:12:37.018Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Inappropriate authorization vulnerability in the system apps. Successful exploitation of this vulnerability may affect service integrity." } ], "value": " Inappropriate authorization vulnerability in the system apps. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:21:04.259Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48508", "datePublished": "2023-07-06T12:21:04.259Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-11-21T14:12:37.018Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41581
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.669Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41581", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22458
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. Local attackers may exploit this vulnerability to cause arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:33:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22458", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. Local attackers may exploit this vulnerability to cause arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22458", "datePublished": "2021-10-28T12:33:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31756
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.205Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Design defects vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:55:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31756", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Design defects vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31756", "datePublished": "2022-06-13T14:55:54", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46761
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:39:38.968Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46761", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T20:26:21.337527Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-09T20:27:03.669Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The system has a vulnerability that may cause dynamic hiding and restoring of app icons.Successful exploitation of this vulnerability may cause malicious hiding of app icons." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46761", "datePublished": "2023-01-06T00:00:00.000Z", "dateReserved": "2022-12-07T00:00:00.000Z", "dateUpdated": "2025-04-09T20:27:03.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38991
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.692Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38991", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38991", "datePublished": "2022-09-16T17:56:49", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.692Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52386
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52386", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T12:50:05.968405Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-27T20:37:54.145Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the RSMC module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Out-of-bounds write vulnerability in the RSMC module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Handling of Length Parameter Inconsistency", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:19:57.110Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52386", "datePublished": "2024-04-08T09:19:57.110Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2025-03-27T20:37:54.145Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42030
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42030", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-09T17:50:14.258398Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-09T17:50:23.235Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the content sharing pop-up module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the content sharing pop-up module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T08:13:26.981Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42030", "datePublished": "2024-08-08T08:13:26.981Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-09T17:50:23.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34166
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-34166", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-11T18:52:58.630507Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-11T18:53:03.668Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of system restart triggered by abnormal callbacks passed to APIs.Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34166", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-11T18:53:03.668Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46770
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46770", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:00:09.547396Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:00:14.137Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds vulnerability in the sensor module. Successful exploitation of this vulnerability may cause mistouch prevention errors on users\u0027 mobile phones." } ], "value": "Out-of-bounds vulnerability in the sensor module. Successful exploitation of this vulnerability may cause mistouch prevention errors on users\u0027 mobile phones." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Handling of Length Parameter Inconsistency", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T02:53:45.996Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46770", "datePublished": "2023-11-08T02:53:45.996Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T19:00:14.137Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40063
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper access control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40063", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper access control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40063", "datePublished": "2022-03-07T13:49:26", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52716
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:36.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52716", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T19:05:03.166002Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-13T15:09:48.227Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of starting activities in the background in the ActivityManagerService (AMS) module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of starting activities in the background in the ActivityManagerService (AMS) module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T09:01:32.933Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52716", "datePublished": "2024-04-07T09:01:32.933Z", "dateReserved": "2024-03-27T03:37:42.326Z", "dateUpdated": "2024-09-13T15:09:48.227Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58112
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58112", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:29:25.735712Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T13:29:33.947Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Exception capture failure vulnerability in the SVG parsing module of the ArkUI framework\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Exception capture failure vulnerability in the SVG parsing module of the ArkUI framework\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:37:59.179Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58112", "datePublished": "2025-04-07T03:37:59.179Z", "dateReserved": "2025-03-27T07:13:48.462Z", "dateUpdated": "2025-04-07T13:29:33.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46761
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.609Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-46761", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:32:45.783465Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:34:26.787Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:31:00.389Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46761", "datePublished": "2023-11-08T09:31:00.389Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T19:34:26.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38999
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.489Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper update of reference count vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38999", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper update of reference count vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38999", "datePublished": "2022-09-16T17:57:38", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46881
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46881", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-16T17:06:35.865412Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-16T17:06:40.504Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46881", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2025-01-16T17:06:40.504Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41580
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41580", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56450
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56450", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T15:16:58.603793Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:17:21.576Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the component driver module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Buffer overflow vulnerability in the component driver module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T03:14:51.159Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56450", "datePublished": "2025-01-08T03:14:51.159Z", "dateReserved": "2024-12-26T08:45:46.159Z", "dateUpdated": "2025-01-08T15:17:21.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39395
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.336Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39395", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:05:04.729317Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:46:38.456Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Mismatch vulnerability in the serialization process in the communication system. Successful exploitation of this vulnerability may affect availability." } ], "value": "Mismatch vulnerability in the serialization process in the communication system. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-19", "description": "CWE-19 Data Processing Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:31:31.535Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39395", "datePublished": "2023-08-13T12:31:31.535Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-09T19:46:38.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38992
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.946Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38992", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38992", "datePublished": "2022-09-16T17:56:55", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56449
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56449", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T15:17:32.796995Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:17:42.154Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the Account module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Privilege escalation vulnerability in the Account module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T03:13:25.971Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56449", "datePublished": "2025-01-08T03:13:25.971Z", "dateReserved": "2024-12-26T08:45:46.159Z", "dateUpdated": "2025-01-08T15:17:42.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34154
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.173Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34154", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-17T16:54:17.175369Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-17T16:54:32.580Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of undefined permissions in HUAWEI VR screen projection.Successful exploitation of this vulnerability will cause third-party apps to create windows in an arbitrary way, consuming system resources." } ], "value": "Vulnerability of undefined permissions in HUAWEI VR screen projection.Successful exploitation of this vulnerability will cause third-party apps to create windows in an arbitrary way, consuming system resources." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-16T06:54:01.644Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34154", "datePublished": "2023-06-16T06:54:01.644Z", "dateReserved": "2023-05-29T09:03:29.115Z", "dateUpdated": "2024-12-17T16:54:32.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52104
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of parameters being not verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of parameters being not verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:23:14.259Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52104", "datePublished": "2024-01-16T09:23:14.259Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-08-02T22:48:12.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44546
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44546", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T18:00:28.964554Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-459", "description": "CWE-459 Incomplete Cleanup", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T18:00:59.527Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has the vulnerability that the mapping is not cleared after the memory is automatically released. Successful exploitation of this vulnerability may cause a system restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Update of Reference Count", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44546", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T18:00:59.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37086
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers which can isolate and read synchronization files of other applications across the UID sandbox." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Preservation of Permissions vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:05:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers which can isolate and read synchronization files of other applications across the UID sandbox." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Preservation of Permissions vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37086", "datePublished": "2021-12-07T16:05:19", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.683Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39384
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "13.0..0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39384", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:09:02.426531Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:13:33.955Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incomplete permission verification in the input method module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of incomplete permission verification in the input method module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:45:05.132Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39384", "datePublished": "2023-08-13T11:45:05.132Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:13:33.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46882
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46882", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-16T16:49:46.256636Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-16T16:55:06.614Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46882", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2025-01-16T16:55:06.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37245
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:32.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37245", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:01:12.558142Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T17:01:21.978Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the modem pinctrl module. Successful exploitation of this vulnerability may affect the integrity and availability of the modem." } ], "value": "Buffer overflow vulnerability in the modem pinctrl module. Successful exploitation of this vulnerability may affect the integrity and availability of the modem." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:32:42.894Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37245", "datePublished": "2023-07-06T12:32:42.894Z", "dateReserved": "2023-06-29T11:07:22.824Z", "dateUpdated": "2024-11-19T17:01:21.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52375
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52375", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T17:05:15.664300Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-26T20:52:38.464Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the WindowManagerServices module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Permission control vulnerability in the WindowManagerServices module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:05:11.201Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52375", "datePublished": "2024-02-18T06:05:11.201Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2025-03-26T20:52:38.464Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22395
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Code injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22395", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22395", "datePublished": "2022-02-25T18:11:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37085
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.752Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Encoding timing vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "Encoding timing vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:05:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37085", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Encoding timing vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Encoding timing vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37085", "datePublished": "2021-12-07T16:05:10", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.752Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46839
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a vulnerability of missing bounds check on length.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Lack of length check vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46839", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56448
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56448", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T14:44:47.995476Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T14:44:56.350Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper access control in the home screen widget module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of improper access control in the home screen widget module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T03:11:56.159Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56448", "datePublished": "2025-01-08T03:11:56.159Z", "dateReserved": "2024-12-26T08:45:46.159Z", "dateUpdated": "2025-01-08T14:44:56.350Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52719
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52719", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:52:33.414498Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:22:43.367Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:34.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the PMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Privilege escalation vulnerability in the PMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:58:21.254Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52719", "datePublished": "2024-05-11T09:58:21.254Z", "dateReserved": "2024-04-23T03:42:13.136Z", "dateUpdated": "2024-08-02T23:11:34.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-31170
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31170", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:39:04.842448Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T14:10:02.643Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" }, { "status": "affected", "version": "4.3.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the security verification module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "value": "Access control vulnerability in the security verification module\nImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:50:03.929Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2025-31170", "datePublished": "2025-04-07T03:50:03.929Z", "dateReserved": "2025-03-27T07:14:14.770Z", "dateUpdated": "2025-04-07T14:10:02.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39983
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": " Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39983", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Data Processing Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39983", "datePublished": "2022-01-03T21:07:34", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52384
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52384", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:53:22.048730Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:56.141Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.781Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Double-free vulnerability in the RSMC module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Double-free vulnerability in the RSMC module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "CWE-415 Double Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:53:58.821Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52384", "datePublished": "2024-05-11T09:53:58.821Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-08-02T22:55:41.781Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40037
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Vulnerability of accessing resources using an incompatible type (type confusion)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Vulnerability of accessing resources using an incompatible type (type confusion)" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40037", "datePublished": "2022-01-07T22:39:37", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.490Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37021
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37021", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37021", "datePublished": "2021-12-07T16:02:00", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22464
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.276Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause system Soft Restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:33:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22464", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause system Soft Restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22464", "datePublished": "2021-10-28T12:33:32", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.276Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34160
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-34160", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-11T18:25:02.496866Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-11T18:25:41.643Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34160", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-11T18:25:41.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48518
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.788Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48518", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T16:57:25.783538Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T16:57:33.457Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of signature verification in the iaware system being initialized later than the time when the system broadcasts are sent. Successful exploitation of this vulnerability may cause malicious apps to start upon power-on by spoofing the package names of apps in the startup trustlist, which affects system performance." } ], "value": "Vulnerability of signature verification in the iaware system being initialized later than the time when the system broadcasts are sent. Successful exploitation of this vulnerability may cause malicious apps to start upon power-on by spoofing the package names of apps in the startup trustlist, which affects system performance." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:53:19.166Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48518", "datePublished": "2023-07-06T12:53:19.166Z", "dateReserved": "2023-06-29T11:23:50.334Z", "dateUpdated": "2024-11-19T16:57:33.457Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48299
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48299", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-25T13:40:39.392034Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T13:41:06.566Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48299", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-25T13:41:06.566Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48488
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48488", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-16T20:30:51.190000Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-16T20:32:03.975Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of bypassing the default desktop security controls.Successful exploitation of this vulnerability may cause unauthorized modifications to the desktop." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48488", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-16T20:32:03.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37009
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.450Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Configuration vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:21:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Configuration vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37009", "datePublished": "2021-11-23T15:21:30", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.450Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36503
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36503", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T13:39:26.960168Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T13:39:52.624Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.278Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory management vulnerability in the Gralloc module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Memory management vulnerability in the Gralloc module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-908", "description": "CWE-908 Use of Uninitialized Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:25:07.573Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36503", "datePublished": "2024-06-14T07:25:07.573Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44119
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44119", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T13:11:44.943462Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:11:53.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of mutual exclusion management in the kernel module.Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of mutual exclusion management in the kernel module.Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-667", "description": "CWE-667 Improper Locking", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:04:19.002Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44119", "datePublished": "2023-10-11T12:04:19.002Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-09-19T13:11:53.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37061
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.858Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Uncontrolled Resource Consumption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Screen projection application denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Resource Consumption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37061", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Uncontrolled Resource Consumption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Screen projection application denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Resource Consumption vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37061", "datePublished": "2021-12-07T16:02:37", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44097
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.258Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44097", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:29:38.951364Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:30:16.188Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:46:30.245Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44097", "datePublished": "2023-10-11T11:46:30.245Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:30:16.188Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44113
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.831Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44113", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-17T20:21:04.197738Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T18:32:25.502Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of missing permission verification for APIs in the Designed for Reliability (DFR) module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of missing permission verification for APIs in the Designed for Reliability (DFR) module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:43:57.730Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44113", "datePublished": "2023-12-06T08:42:11.010Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-10-10T18:32:25.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22453
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.131Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:33:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22453", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22453", "datePublished": "2021-10-28T12:33:19", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.131Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54118
Vulnerability from cvelistv5
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2024-12-13T01:58:36.827Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "rejectedReasons": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54118", "datePublished": "2024-12-12T12:14:42.559Z", "dateRejected": "2024-12-13T01:58:36.827Z", "dateReserved": "2024-11-29T02:34:46.792Z", "dateUpdated": "2024-12-13T01:58:36.827Z", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37037
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Invalid address access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:11:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Invalid address access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37037", "datePublished": "2021-12-08T14:11:47", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31225
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:31.085Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-31225", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-16T16:16:26.101757Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-16T16:16:31.668Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Gallery app has the risk of hijacking attacks. Successful exploitation of this vulnerability may cause download failures and affect product availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-31225", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2025-01-16T16:16:31.668Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46321
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.963Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46321", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T17:58:54.245232Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T18:19:46.454Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Wi-Fi module has a vulnerability in permission verification. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46321", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-16T18:19:46.454Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51510
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51510", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T15:36:54.101614Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T15:37:04.355Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" }, { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds access vulnerability in the logo module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Out-of-bounds access vulnerability in the logo module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:24:44.011Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51510", "datePublished": "2024-11-05T08:24:44.011Z", "dateReserved": "2024-10-29T01:43:54.523Z", "dateUpdated": "2024-11-05T15:37:04.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22419
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to cause persistent dos." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient Verification of Data Authenticity", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:20:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22419", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to cause persistent dos." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient Verification of Data Authenticity" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22419", "datePublished": "2021-08-03T17:20:27", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42038
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42038", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T15:22:20.484788Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T15:22:32.499Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of PIN enhancement failures in the screen lock module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "value": "Vulnerability of PIN enhancement failures in the screen lock module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-310", "description": "CWE-310 Cryptographic Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:31:40.594Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42038", "datePublished": "2024-08-08T09:31:40.594Z", "dateReserved": "2024-07-27T06:52:58.401Z", "dateUpdated": "2024-08-08T15:22:32.499Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31755
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.098Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission preservation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:54:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31755", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission preservation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31755", "datePublished": "2022-06-13T14:56:09", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.098Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37096
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.811Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to user privacy disclosed." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37096", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to user privacy disclosed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37096", "datePublished": "2021-12-07T16:06:28", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38996
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.719Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:04", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38996", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38996", "datePublished": "2022-09-16T17:57:04", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.719Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52380
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52380", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:58:37.596989Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-01T14:43:31.786Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.776Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper access control in the email module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of improper access control in the email module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:11:55.892Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52380", "datePublished": "2024-02-18T06:11:55.892Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-11-01T14:43:31.786Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56451
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56451", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T15:13:53.990773Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:14:01.909Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Integer overflow vulnerability during glTF model loading in the 3D engine module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Integer overflow vulnerability during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-680", "description": "CWE-680 Integer Overflow to Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T03:16:10.615Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56451", "datePublished": "2025-01-08T03:16:10.615Z", "dateReserved": "2024-12-26T08:45:46.159Z", "dateUpdated": "2025-01-08T15:14:01.909Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56439
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56439", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T15:28:24.807534Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:28:37.505Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the identity authentication module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access control vulnerability in the identity authentication module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T02:05:13.262Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56439", "datePublished": "2025-01-08T02:05:13.262Z", "dateReserved": "2024-12-26T08:45:46.157Z", "dateUpdated": "2025-01-08T15:28:37.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41301
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41301", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:17:17.994354Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:20:11.039Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unauthorized API access in the PMS module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of unauthorized API access in the PMS module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:08:30.160Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41301", "datePublished": "2023-09-25T12:08:30.160Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T15:20:11.039Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52379
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52379", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T15:30:07.873785Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-18T20:50:10.879Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the calendarProvider module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the calendarProvider module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:10:40.306Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52379", "datePublished": "2024-02-18T06:10:40.306Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2025-03-18T20:50:10.879Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52388
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52388", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T14:57:39.777962Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-13T16:20:11.272Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the clock module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission control vulnerability in the clock module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:39:24.594Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52388", "datePublished": "2024-04-08T08:39:24.594Z", "dateReserved": "2024-01-26T06:51:31.238Z", "dateUpdated": "2025-03-13T16:20:11.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37099
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.751Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete any file." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37099", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete any file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37099", "datePublished": "2021-12-07T16:06:32", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40064
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.704Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40064", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40064", "datePublished": "2022-03-07T13:49:22", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.704Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32995
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32995", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:49:22.118972Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:52:08.223Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Denial of service (DoS) vulnerability in the AMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Denial of service (DoS) vulnerability in the AMS module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:00:18.321Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32995", "datePublished": "2024-05-11T10:00:18.321Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.455Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-47976
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:02:36.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-47976", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T20:01:39.751252Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-09T20:02:09.637Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DMSDP module of the distributed hardware has a vulnerability that may cause imposter control connections.Successful exploitation of this vulnerability may disconnect normal service connections." } ], "problemTypes": [ { "descriptions": [ { "description": "Control connection replacement vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-47976", "datePublished": "2023-01-06T00:00:00.000Z", "dateReserved": "2022-12-28T00:00:00.000Z", "dateUpdated": "2025-04-09T20:02:09.637Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37111
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leakage", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37111", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leakage" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37111", "datePublished": "2022-01-03T21:07:27", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-57956
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-57956", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T13:55:20.473207Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T19:51:09.761Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the interpreter string module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Out-of-bounds read vulnerability in the interpreter string module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-680", "description": "CWE-680 Integer Overflow to Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T12:26:10.611Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/2/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-57956", "datePublished": "2025-02-06T12:26:10.611Z", "dateReserved": "2025-01-22T03:37:52.394Z", "dateUpdated": "2025-02-12T19:51:09.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44112
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.001Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44112", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-26T19:23:26.143999Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T19:46:01.244Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds access vulnerability in the device authentication module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Out-of-bounds access vulnerability in the device authentication module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:00:06.992Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44112", "datePublished": "2024-01-16T08:00:06.992Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-03T19:46:01.244Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-8298
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8298", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:06:53.827509Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:07:09.553Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory request vulnerability in the memory management module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Memory request vulnerability in the memory management module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T02:22:15.826Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-8298", "datePublished": "2024-09-04T02:22:15.826Z", "dateReserved": "2024-08-29T06:20:19.754Z", "dateUpdated": "2024-09-04T13:07:09.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40024
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Information leakage vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information leakage vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40024", "datePublished": "2022-09-16T17:55:38", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.455Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4565
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:31:06.320Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-4565", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T17:52:57.918108Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T17:58:51.981Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Broadcast permission control vulnerability in the framework module. Successful exploitation of this vulnerability may cause the hotspot feature to be unavailable." } ], "value": "Broadcast permission control vulnerability in the framework module. Successful exploitation of this vulnerability may cause the hotspot feature to be unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:25:36.605Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-4565", "datePublished": "2023-09-26T01:25:36.605Z", "dateReserved": "2023-08-28T12:18:27.503Z", "dateUpdated": "2024-09-24T17:58:51.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41307
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.951Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41307", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T19:58:38.157924Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T20:00:44.351Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:16:21.629Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41307", "datePublished": "2023-09-26T01:16:21.629Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T20:00:44.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44118
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44118", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T13:12:45.649681Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:14:46.256Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of undefined permissions in the MeeTime module.Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "value": "Vulnerability of undefined permissions in the MeeTime module.Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:02:51.902Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44118", "datePublished": "2023-10-11T12:02:51.902Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-09-19T13:14:46.256Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58109
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58109", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:31:25.263393Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T13:31:34.489Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the codec module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Buffer overflow vulnerability in the codec module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:35:12.667Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58109", "datePublished": "2025-04-07T03:35:12.667Z", "dateReserved": "2025-03-27T07:13:48.462Z", "dateUpdated": "2025-04-07T13:31:34.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41602
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41602", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.024Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52116
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the multi-screen interaction module. Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "value": "Permission management vulnerability in the multi-screen interaction module. Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:24:07.748Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52116", "datePublished": "2024-01-16T08:24:07.748Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.468Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-7271
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-7271", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T13:28:07.668981Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T15:54:33.854Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.022Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the NMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Privilege escalation vulnerability in the NMS module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:49:14.969Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-7271", "datePublished": "2024-07-25T11:49:14.969Z", "dateReserved": "2024-07-08T10:53:54.124Z", "dateUpdated": "2024-08-02T08:57:35.022Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52713
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52713", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T19:42:49.196947Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-14T19:53:45.209Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission control in the window management module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:41:49.250Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52713", "datePublished": "2024-04-07T08:41:49.250Z", "dateReserved": "2024-03-27T03:37:42.326Z", "dateUpdated": "2024-11-14T19:53:45.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39674
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39674", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T13:29:22.273059Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T15:54:53.264Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Plaintext vulnerability in the Gallery search module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Plaintext vulnerability in the Gallery search module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312 Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:42:56.291Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39674", "datePublished": "2024-07-25T11:42:56.291Z", "dateReserved": "2024-06-27T08:24:56.590Z", "dateUpdated": "2024-08-02T04:26:15.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46765
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46765", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:19:55.559656Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-28T20:53:53.424Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of uncaught exceptions in the NFC module. Successful exploitation of this vulnerability can affect NFC availability." } ], "value": "Vulnerability of uncaught exceptions in the NFC module. Successful exploitation of this vulnerability can affect NFC availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:14:18.869Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46765", "datePublished": "2023-11-08T09:14:18.869Z", "dateReserved": "2023-10-26T11:33:04.518Z", "dateUpdated": "2024-10-28T20:53:53.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46324
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:46.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46324", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T17:56:29.655497Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T18:18:45.393Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46324", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-16T18:18:45.393Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22422
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.245Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow or Wraparound", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:16:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22422", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22422", "datePublished": "2021-08-03T17:16:12", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.245Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1695
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:25.012Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-1695", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T15:22:14.394758Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-27T15:22:51.221Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755 Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:51:58.425Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1695", "datePublished": "2023-07-06T12:51:58.425Z", "dateReserved": "2023-03-29T09:29:53.740Z", "dateUpdated": "2024-11-27T15:22:51.221Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44558
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.917Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44558", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T13:53:09.684632Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T13:54:32.124Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44558", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T13:54:32.124Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37059
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.800Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Weaknesses Introduced During Design" } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37059", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Weaknesses Introduced During Design" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37059", "datePublished": "2021-12-07T16:02:27", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48357
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.731Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48357", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T16:54:50.912495Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-19T16:56:57.607Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Some products have the double fetch vulnerability. Successful exploitation of this vulnerability may cause denial of service (DoS) attacks to the kernel." } ], "problemTypes": [ { "descriptions": [ { "description": "Double fetch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48357", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-19T16:56:57.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41304
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41304", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:10:26.316499Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:10:38.170Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the window module.Successful exploitation of this vulnerability may cause the size of an app window to be adjusted to that of a floating window." } ], "value": "Parameter verification vulnerability in the window module.Successful exploitation of this vulnerability may cause the size of an app window to be adjusted to that of a floating window." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:56:35.365Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41304", "datePublished": "2023-10-11T11:56:35.365Z", "dateReserved": "2023-08-28T12:17:09.165Z", "dateUpdated": "2024-09-18T15:10:38.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48312
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.818Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48312", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T17:02:29.340340Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T17:02:53.520Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The HwPCAssistant module has the out-of-bounds read/write vulnerability. Successful exploitation of this vulnerability may affect confidentiality and integrity." } ], "value": "The HwPCAssistant module has the out-of-bounds read/write vulnerability. Successful exploitation of this vulnerability may affect confidentiality and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "out-of-bounds read/write vulnerability", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-16T06:01:46.922Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48312", "datePublished": "2023-04-16T06:01:46.922Z", "dateReserved": "2023-02-06T03:32:29.062Z", "dateUpdated": "2025-02-06T17:02:53.520Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48302
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.732Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48302", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-24T20:34:20.816922Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-24T20:34:24.881Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability of lacking permission verification in APIs.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48302", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-24T20:34:24.881Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39404
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.432Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39404", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T16:22:45.741109Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T16:22:57.466Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameter verification in certain APIs in the window management module. Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Vulnerability of input parameter verification in certain APIs in the window management module. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:41:04.975Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39404", "datePublished": "2023-08-13T12:41:04.975Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T16:22:57.466Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45447
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45447", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:11:39.883408Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:11:52.999Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the camera framework module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access control vulnerability in the camera framework module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T02:16:37.736Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45447", "datePublished": "2024-09-04T02:16:37.736Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:11:52.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49242
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Free broadcast vulnerability in the running management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Free broadcast vulnerability in the running management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:49:41.628Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49242", "datePublished": "2023-12-06T08:49:41.628Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:44.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39978
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues." } ], "problemTypes": [ { "descriptions": [ { "description": "SQL Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39978", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "SQL Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39978", "datePublished": "2022-01-03T21:07:23", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37066
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.771Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:03:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37066", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37066", "datePublished": "2021-12-07T16:03:06", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.771Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48348
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.717Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48348", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-24T19:09:42.611302Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-24T19:10:14.845Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MediaProvider module has a vulnerability of unauthorized data read. Successful exploitation of this vulnerability may affect confidentiality and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized data read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48348", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-24T19:10:14.845Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56446
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56446", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T14:46:45.515903Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T14:46:53.161Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of variables not being initialized in the notification module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of variables not being initialized in the notification module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-457", "description": "CWE-457 Use of Uninitialized Variable", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T03:01:49.820Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56446", "datePublished": "2025-01-08T03:01:49.820Z", "dateReserved": "2024-12-26T08:45:46.158Z", "dateUpdated": "2025-01-08T14:46:53.161Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39381
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.304Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39381", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:19:57.143959Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:20:49.575Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Input verification vulnerability in the storage module. Successful exploitation of this vulnerability may cause the device to restart." } ], "value": " Input verification vulnerability in the storage module. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:41:06.778Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39381", "datePublished": "2023-08-13T11:41:06.778Z", "dateReserved": "2023-07-31T04:41:32.210Z", "dateUpdated": "2024-10-10T14:20:49.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46741
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:41.587Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:12:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46741", "datePublished": "2022-07-11T13:52:47", "dateReserved": "2022-03-26T00:00:00", "dateUpdated": "2024-08-04T05:17:41.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22466
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.453Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Use After Free vulnerability. Local attackers may exploit this vulnerability to cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Use After Free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:32:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22466", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Use After Free vulnerability. Local attackers may exploit this vulnerability to cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22466", "datePublished": "2021-10-28T12:32:42", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37110
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI;Harmony OS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.835Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI;Harmony OS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" }, { "status": "affected", "version": "Harmony OS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Timing design defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37110", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI;Harmony OS", "version": { "version_data": [ { "version_value": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" }, { "version_value": "Harmony OS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Timing design defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37110", "datePublished": "2022-01-03T21:07:44", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.835Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22441
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.196Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some Huawei products have an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:10:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22441", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some Huawei products have an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22441", "datePublished": "2022-02-25T18:10:58", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.196Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39409
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39409", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T14:17:08.865172Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T14:20:17.064Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T10:50:05.423Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39409", "datePublished": "2023-09-25T10:50:05.423Z", "dateReserved": "2023-07-31T04:41:37.871Z", "dateUpdated": "2024-09-24T14:20:17.064Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-26548
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:53:53.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-26548", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T15:42:52.800297Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-19T15:43:20.215Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The pgmng module has a vulnerability in serialization/deserialization. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-26548", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-19T15:43:20.215Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54107
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54107", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:00:39.983397Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:00:49.039Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Read/Write vulnerability in the image decoding module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Read/Write vulnerability in the image decoding module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T12:01:58.309Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54107", "datePublished": "2024-12-12T12:01:58.309Z", "dateReserved": "2024-11-29T02:34:46.790Z", "dateUpdated": "2024-12-12T15:00:49.039Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22489
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22489", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DoS vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22489", "datePublished": "2022-02-25T18:11:03", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52721
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52721", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-28T20:15:52.408244Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:24:02.872Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The WindowManager module has a vulnerability in permission control.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The WindowManager module has a vulnerability in permission control.\nImpact: Successful exploitation of this vulnerability may affect confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:16:08.629Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52721", "datePublished": "2024-05-11T10:16:08.629Z", "dateReserved": "2024-04-23T03:42:13.137Z", "dateUpdated": "2024-08-02T23:11:35.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38998
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.249Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HISP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38998", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39405
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39405", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:25:00.796235Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:25:55.849Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of out-of-bounds parameter read/write in the Wi-Fi module. Successful exploitation of this vulnerability may cause other apps to be executed with escalated privileges." } ], "value": "Vulnerability of out-of-bounds parameter read/write in the Wi-Fi module. Successful exploitation of this vulnerability may cause other apps to be executed with escalated privileges." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:37:24.597Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39405", "datePublished": "2023-08-13T11:37:24.597Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-10T14:25:55.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58124
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58124", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:39:16.480996Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T14:10:38.230Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the security verification module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "value": "Access control vulnerability in the security verification module\nImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:41:56.127Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58124", "datePublished": "2025-04-07T03:41:56.127Z", "dateReserved": "2025-03-27T07:13:48.463Z", "dateUpdated": "2025-04-07T14:10:38.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52109
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.477Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345 Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:53:43.467Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52109", "datePublished": "2024-01-16T07:53:43.467Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41576
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:41.885Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The rphone module has a script that can be maliciously modified.Successful exploitation of this vulnerability may cause irreversible programs to be implanted on user devices." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41576", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:41.885Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52542
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52542", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T18:23:02.155930Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T20:31:53.760Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the system module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the system module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:48:33.106Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52542", "datePublished": "2024-04-08T08:48:33.106Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-12-06T20:31:53.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37013
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the availability of users is affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:27:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37013", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the availability of users is affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37013", "datePublished": "2021-11-23T15:27:45", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34161
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-34161", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-11T18:43:32.799692Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-11T18:44:02.066Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "nappropriate authorization vulnerability in the SettingsProvider module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34161", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-11T18:44:02.066Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44553
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.940Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44553", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T14:01:58.797820Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T14:03:48.410Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiView module has a vulnerability of not filtering third-party apps out when the HiView module traverses to invoke the system provider. Successful exploitation of this vulnerability may cause third-party apps to start periodically." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44553", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T14:03:48.410Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-4046
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-4046", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:46:21.735350Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-23T18:37:53.636Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:26:57.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cracking vulnerability in the OS security module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Cracking vulnerability in the OS security module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:14:22.270Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-4046", "datePublished": "2024-05-11T10:14:22.270Z", "dateReserved": "2024-04-23T03:46:12.366Z", "dateUpdated": "2024-08-01T20:26:57.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40050
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40050", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40050", "datePublished": "2022-03-07T13:50:49", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46895
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-46895", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T16:21:38.608896Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T16:21:45.687Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of defects introduced in the design process in the Multi-Device Task Center. Successful exploitation of this vulnerability will cause the hopped app to bypass the app lock and reset the device that initiates the hop." } ], "value": "Vulnerability of defects introduced in the design process in the Multi-Device Task Center. Successful exploitation of this vulnerability will cause the hopped app to bypass the app lock and reset the device that initiates the hop." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:45:33.542Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46895", "datePublished": "2023-08-13T12:45:33.542Z", "dateReserved": "2023-06-29T11:27:53.897Z", "dateUpdated": "2024-10-09T16:21:45.687Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48606
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.520Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48606", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T14:36:50.235502Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T14:37:44.209Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Stability-related vulnerability in the binder background management and control module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Stability-related vulnerability in the binder background management and control module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:27:26.749Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48606", "datePublished": "2023-09-26T01:27:26.749Z", "dateReserved": "2023-08-28T12:36:19.571Z", "dateUpdated": "2024-09-24T14:37:44.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39011
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.256Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HISP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause unauthorized access to the HISP module." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39011", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.256Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48289
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48289", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-24T20:43:05.214238Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-24T20:43:27.050Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48289", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-24T20:43:27.050Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41311
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41311", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T13:07:17.669193Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T13:07:33.566Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause an app to be activated automatically." } ], "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause an app to be activated automatically." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:22:20.306Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41311", "datePublished": "2023-09-26T01:22:20.306Z", "dateReserved": "2023-08-28T12:17:09.167Z", "dateUpdated": "2024-09-25T13:07:33.566Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44552
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44552", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T14:35:59.253796Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "CWE-404 Improper Resource Shutdown or Release", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T14:36:27.948Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The lock screen module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44552", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T14:36:27.948Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41306
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41306", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T18:49:09.768594Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T18:49:21.601Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable." } ], "value": "Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:14:26.222Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41306", "datePublished": "2023-09-26T01:14:26.222Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T18:49:21.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48294
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48294", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-24T20:38:31.582336Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-24T20:38:57.546Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The IHwAttestationService interface has a defect in authentication. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48294", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-24T20:38:57.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37020
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.767Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:01:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37020", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37020", "datePublished": "2021-12-07T16:01:55", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.767Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37074
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.702Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Race Condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37074", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race Condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37074", "datePublished": "2021-12-08T14:12:53", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52099
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.471Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-52099", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T20:18:55.355916Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T20:19:07.044Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of foreground service restrictions being bypassed in the NMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of foreground service restrictions being bypassed in the NMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:13:24.417Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52099", "datePublished": "2024-01-16T09:13:24.417Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-11-13T20:19:07.044Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54119
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54119", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:20:46.810899Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:42:59.394Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cross-process screen stack vulnerability in the UIExtension module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T12:18:33.841Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54119", "datePublished": "2024-12-12T12:18:33.841Z", "dateReserved": "2024-11-29T02:34:46.792Z", "dateUpdated": "2024-12-12T15:42:59.394Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40065
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic error vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40065", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic error vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40065", "datePublished": "2022-04-11T19:38:24", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52715
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52715", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T13:11:45.425225Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-28T18:41:40.523Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.387Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The SystemUI module has a vulnerability in permission management.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "The SystemUI module has a vulnerability in permission management.\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T09:00:08.128Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52715", "datePublished": "2024-04-07T09:00:08.128Z", "dateReserved": "2024-03-27T03:37:42.326Z", "dateUpdated": "2025-03-28T18:41:40.523Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45446
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45446", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:12:25.875459Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:12:39.116Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the camera driver module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Access permission verification vulnerability in the camera driver module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T02:14:48.613Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45446", "datePublished": "2024-09-04T02:14:48.613Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:12:39.116Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34159
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.212Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-34159", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-11T17:45:17.270525Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-11T17:45:45.318Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "unspecified" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "unspecified" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper permission control vulnerability in the Notepad app.Successful exploitation of the vulnerability may lead to privilege escalation, which affects availability and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34159", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-11T17:45:45.318Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22255
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The application framework has a common DoS vulnerability.Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Common DoS vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:20", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22255", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The application framework has a common DoS vulnerability.Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Common DoS vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22255", "datePublished": "2022-04-11T19:38:20", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39985
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.144Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwNearbyMain module has a Improper Validation of Array Index vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": " Improper Validation of Array Index", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:36", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39985", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwNearbyMain module has a Improper Validation of Array Index vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Improper Validation of Array Index" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39985", "datePublished": "2022-01-03T21:07:36", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49246
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.892Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:01:24.648Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49246", "datePublished": "2023-12-06T09:01:24.648Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:44.892Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51516
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51516", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:42:12.314984Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:27.035Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the ability module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause features to function abnormally." } ], "value": "Permission control vulnerability in the ability module\nImpact: Successful exploitation of this vulnerability may cause features to function abnormally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:03:15.961Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51516", "datePublished": "2024-11-05T09:03:15.961Z", "dateReserved": "2024-10-29T01:43:54.525Z", "dateUpdated": "2024-11-05T14:53:27.035Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37062
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory overflow and information leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Validation of Array Index vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37062", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory overflow and information leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Validation of Array Index vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37062", "datePublished": "2021-12-07T16:02:43", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37043
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.761Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Resource Consumption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37043", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Resource Consumption vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37043", "datePublished": "2021-12-07T16:02:05", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46326
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:46.316Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46326", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T17:53:22.649367Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T18:18:01.305Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46326", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-16T18:18:01.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52372
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.779Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "04.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52372", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:08:27.734292Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T15:20:10.143Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameter verification in the motor module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of input parameter verification in the motor module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:51:16.108Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52372", "datePublished": "2024-02-18T03:51:16.108Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-08-29T15:20:10.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46786
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.429Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:02:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46786", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds memory access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46786", "datePublished": "2022-05-13T15:02:16", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-04T05:17:42.429Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39670
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39670", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T13:54:55.648338Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-25T14:01:13.034Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the account synchronisation module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Privilege escalation vulnerability in the account synchronisation module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:45:24.377Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39670", "datePublished": "2024-07-25T11:45:24.377Z", "dateReserved": "2024-06-27T08:24:56.589Z", "dateUpdated": "2024-08-02T04:26:15.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48479
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.811Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202305-0000001532778780" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48479", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-15T16:13:51.270591Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-15T16:13:55.407Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The facial recognition TA of some products has the out-of-bounds memory read vulnerability. Successful exploitation of this vulnerability may cause exceptions of the facial recognition service." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202305-0000001532778780" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48479", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2025-01-15T16:13:55.407Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22253
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper validation of integrity check values Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22253", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper validation of integrity check values Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22253", "datePublished": "2022-04-11T19:38:22", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44563
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44563", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T14:31:44.084159Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T14:32:09.385Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a race condition vulnerability in SD upgrade mode. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44563", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T14:32:09.385Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37057
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.712Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to restart the phone." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Validation of Array Index vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37057", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to restart the phone." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Validation of Array Index vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37057", "datePublished": "2021-12-07T16:02:16", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.712Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40006
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eVulnerability of design defects in the security algorithm component. Successful exploitation of this vulnerability may affect confidentiality.\u003c/p\u003e" } ], "value": "Vulnerability of design defects in the security algorithm component. Successful exploitation of this vulnerability may affect confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-254", "description": "CWE-254 7PK - Security Features", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:50:52.820Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fingerprint module has a security risk of brute force cracking. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Security Features" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40006", "datePublished": "2022-01-07T22:39:30", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37100
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.737Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to account authentication bypassed." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Authentication vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37100", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to account authentication bypassed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Authentication vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37100", "datePublished": "2021-12-07T16:06:39", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.737Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44117
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.861Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:49:56.189Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44117", "datePublished": "2024-01-16T07:49:56.189Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-08-02T19:59:50.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49240
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.836Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the launcher module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Unauthorized access vulnerability in the launcher module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:06:04.495Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49240", "datePublished": "2023-12-06T09:06:04.495Z", "dateReserved": "2023-11-24T07:33:47.174Z", "dateUpdated": "2024-08-02T21:53:44.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44108
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44108", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T17:56:18.332635Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T17:58:04.587Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:08:10.395Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44108", "datePublished": "2023-10-11T12:08:10.395Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-18T17:58:04.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58115
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58115", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:28:27.505753Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T13:28:35.116Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the SVG parsing module of the ArkUI framework\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Buffer overflow vulnerability in the SVG parsing module of the ArkUI framework\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:40:13.360Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58115", "datePublished": "2025-04-07T03:40:13.360Z", "dateReserved": "2025-03-27T07:13:48.463Z", "dateUpdated": "2025-04-07T13:28:35.116Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46319
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.888Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46319", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T18:06:32.391204Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T18:20:35.087Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Fingerprint calibration has a vulnerability of lacking boundary judgment. Successful exploitation of this vulnerability may cause out-of-bounds write." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46319", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-16T18:20:35.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-57961
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-57961", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T14:21:11.850714Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-06T14:21:20.703Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the emcom module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Out-of-bounds write vulnerability in the emcom module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T12:33:50.291Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/2/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-57961", "datePublished": "2025-02-06T12:33:50.291Z", "dateReserved": "2025-01-22T03:37:52.395Z", "dateUpdated": "2025-02-06T14:21:20.703Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38984
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.200Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HIPP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38984", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.200Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40010
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:12:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40010", "datePublished": "2022-01-07T22:39:40", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-57960
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-57960", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T14:24:56.784882Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-06T14:25:06.468Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.3.0" }, { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the ExternalStorageProvider module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Input verification vulnerability in the ExternalStorageProvider module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T12:32:39.794Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/2/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-57960", "datePublished": "2025-02-06T12:32:39.794Z", "dateReserved": "2025-01-22T03:37:52.395Z", "dateUpdated": "2025-02-06T14:25:06.468Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37077
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.858Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "NULL Pointer Dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:14", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37077", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL Pointer Dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37077", "datePublished": "2021-12-07T16:04:14", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5465
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5465", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T15:39:16.404798Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:39:41.731Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:11:12.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Function vulnerabilities in the Calendar module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Function vulnerabilities in the Calendar module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:30:57.462Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-5465", "datePublished": "2024-06-14T07:30:57.462Z", "dateReserved": "2024-05-29T07:57:46.652Z", "dateUpdated": "2024-08-01T21:11:12.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46320
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.182Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46320", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T18:05:59.085440Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T18:20:13.254Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46320", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-16T18:20:13.254Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52374
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52374", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T21:38:58.145602Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-19T21:40:53.146Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the package management module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the package management module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T04:04:47.756Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52374", "datePublished": "2024-02-18T04:04:47.756Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-11-19T21:40:53.146Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56436
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56436", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T17:11:17.513551Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T17:11:25.426Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cross-process screen stack vulnerability in the UIExtension module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T01:46:26.175Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56436", "datePublished": "2025-01-08T01:46:26.175Z", "dateReserved": "2024-12-26T08:45:46.156Z", "dateUpdated": "2025-01-08T17:11:25.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39008
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps." } ], "problemTypes": [ { "descriptions": [ { "description": "Bundle serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Bundle serialization/deserialization mismatch vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39008", "datePublished": "2022-09-16T17:55:34", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39391
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39391", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T13:53:56.356852Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T13:54:41.514Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of system file information leakage in the USB Service module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Vulnerability of system file information leakage in the USB Service module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:25:22.970Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39391", "datePublished": "2023-08-13T12:25:22.970Z", "dateReserved": "2023-07-31T04:41:36.391Z", "dateUpdated": "2024-10-10T13:54:41.514Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37094
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37094", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37094", "datePublished": "2021-12-07T16:06:17", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44547
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44547", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T15:15:28.953758Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T15:15:49.399Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Display Service module has a UAF vulnerability. Successful exploitation of this vulnerability may affect the display service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44547", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T15:15:49.399Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29794
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.678Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The frame scheduling module has a Use After Free (UAF) vulnerability.Successful exploitation of this vulnerability will affect data integrity, availability, and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:05:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29794", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The frame scheduling module has a Use After Free (UAF) vulnerability.Successful exploitation of this vulnerability will affect data integrity, availability, and confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UAF vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29794", "datePublished": "2022-05-13T15:05:27", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.678Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37090
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.697Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37090", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37090", "datePublished": "2021-12-07T16:06:00", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.697Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41297
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.168Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41297", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T16:16:34.540132Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T16:16:44.175Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of defects introduced in the design process in the HiviewTunner module. Successful exploitation of this vulnerability may cause service hijacking." } ], "value": "Vulnerability of defects introduced in the design process in the HiviewTunner module. Successful exploitation of this vulnerability may cause service hijacking." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T11:39:06.939Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41297", "datePublished": "2023-09-25T11:39:06.939Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T16:16:44.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37065
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality or Availability impacted." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow or Wraparound vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:03:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37065", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality or Availability impacted." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow or Wraparound vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37065", "datePublished": "2021-12-07T16:03:01", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42033
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42033", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T14:11:41.251489Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T14:11:53.494Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the security verification module\u003cbr\u003empact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "value": "Access control vulnerability in the security verification module\nmpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:21:20.866Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42033", "datePublished": "2024-08-08T09:21:20.866Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-08T14:11:53.494Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46316
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.792Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46316", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T13:28:00.650231Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T13:28:17.228Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A thread security vulnerability exists in the authentication process. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Thread security vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46316", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-17T13:28:17.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44101
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44101", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:25:06.798507Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:26:27.153Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Bluetooth module has a vulnerability in permission control for broadcast notifications.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Bluetooth module has a vulnerability in permission control for broadcast notifications.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:48:56.203Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44101", "datePublished": "2023-10-11T11:48:56.203Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:26:27.153Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37070
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.793Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:03:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37070", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37070", "datePublished": "2021-12-07T16:03:47", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48286
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48286", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-25T13:41:56.277493Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T13:42:25.761Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The multi-screen collaboration module has a privilege escalation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48286", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-25T13:42:25.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46762
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:39:38.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46762", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T20:25:28.956454Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-09T20:26:02.001Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The memory management module has a logic bypass vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46762", "datePublished": "2023-01-06T00:00:00.000Z", "dateReserved": "2022-12-07T00:00:00.000Z", "dateUpdated": "2025-04-09T20:26:02.001Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52114
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "11.0.1" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52114", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-27T15:16:31.632593Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-27T15:27:35.761Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Data confidentiality vulnerability in the ScreenReader module. Successful exploitation of this vulnerability may affect service integrity." } ], "value": "Data confidentiality vulnerability in the ScreenReader module. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:21:37.633Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52114", "datePublished": "2024-01-16T08:21:37.633Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-27T15:27:35.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51530
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51530", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:40:27.154731Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:51:43.931Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "LaunchAnywhere vulnerability in the account module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "LaunchAnywhere vulnerability in the account module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T11:19:57.997Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51530", "datePublished": "2024-11-05T11:19:57.997Z", "dateReserved": "2024-10-29T01:43:54.528Z", "dateUpdated": "2024-11-05T14:51:43.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37079
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.729Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete arbitrary file by system_app permission." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37079", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete arbitrary file by system_app permission." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37079", "datePublished": "2021-12-07T16:04:24", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.729Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41593
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.392Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41593", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52545
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:21.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52545", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T15:11:24.279500Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-26T16:51:53.780Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of undefined permissions in the Calendar app.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of undefined permissions in the Calendar app.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:53:09.751Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52545", "datePublished": "2024-04-08T08:53:09.751Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-08-26T16:51:53.780Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54121
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54121", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T14:27:23.627290Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T14:27:37.155Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Startup control vulnerability in the ability module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Startup control vulnerability in the ability module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T03:24:36.500Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54121", "datePublished": "2025-01-08T03:24:36.500Z", "dateReserved": "2024-11-29T02:34:46.792Z", "dateUpdated": "2025-01-08T14:27:37.155Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44104
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44104", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:16:41.136828Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:17:04.450Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:52:52.971Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44104", "datePublished": "2023-10-11T11:52:52.971Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:17:04.450Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54114
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54114", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:20:59.125975Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:43:49.188Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds access vulnerability in playback in the DASH module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Out-of-bounds access vulnerability in playback in the DASH module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T12:10:28.427Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54114", "datePublished": "2024-12-12T12:10:28.427Z", "dateReserved": "2024-11-29T02:34:46.791Z", "dateUpdated": "2024-12-12T15:43:49.188Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46315
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46315", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T13:19:11.998292Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T13:19:56.934Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe ProfileSDK has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability.\u003c/p\u003e" } ], "value": "The ProfileSDK has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T03:51:33.193Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46315", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-17T13:19:56.934Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-27521
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27521", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:28:48.574138Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:28:59.385Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper access permission in the process management module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of improper access permission in the process management module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T07:13:32.851Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2025-27521", "datePublished": "2025-03-04T07:13:32.851Z", "dateReserved": "2025-02-27T02:29:37.525Z", "dateUpdated": "2025-03-04T14:28:59.385Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52541
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52541", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-31T15:03:18.996179Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-31T15:05:06.846Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Authentication vulnerability in the API for app pre-loading.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Authentication vulnerability in the API for app pre-loading.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:47:29.919Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52541", "datePublished": "2024-04-08T08:47:29.919Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-10-31T15:05:06.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46771
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46771", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T18:56:55.647199Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:01:40.614Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Security vulnerability in the face unlock module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Security vulnerability in the face unlock module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:03:34.784Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46771", "datePublished": "2023-11-08T09:03:34.784Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T19:01:40.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48613
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.653Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48613", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:08:52.581746Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:10:17.357Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the kernel module. Successful exploitation of this vulnerability may cause variable values to be read with the condition evaluation bypassed." } ], "value": "Race condition vulnerability in the kernel module. Successful exploitation of this vulnerability may cause variable values to be read with the condition evaluation bypassed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:08:56.211Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48613", "datePublished": "2023-11-08T09:08:56.211Z", "dateReserved": "2023-10-26T12:17:08.302Z", "dateUpdated": "2024-09-04T19:10:17.357Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37002
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:52", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37002", "datePublished": "2022-08-09T20:10:52", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22252
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.208Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:10:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22252", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UAF vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22252", "datePublished": "2022-05-13T15:10:19", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37097
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.751Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Code Injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37097", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code Injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37097", "datePublished": "2021-12-08T14:13:16", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39001
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.038Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path traversal vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39001", "datePublished": "2022-09-16T17:57:48", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.038Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44116
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44116", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:01:35.724856Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:02:43.370Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of access permissions not being strictly verified in the APPWidget module.Successful exploitation of this vulnerability may cause some apps to run without being authorized." } ], "value": "Vulnerability of access permissions not being strictly verified in the APPWidget module.Successful exploitation of this vulnerability may cause some apps to run without being authorized." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:01:44.161Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44116", "datePublished": "2023-10-11T12:01:44.161Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-09-18T15:02:43.370Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44106
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.650Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44106", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:11:11.666352Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:15:30.442Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "API permission management vulnerability in the Fwk-Display module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "API permission management vulnerability in the Fwk-Display module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:55:10.352Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44106", "datePublished": "2023-10-11T11:55:10.352Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:15:30.442Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44107
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.876Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44107", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T16:04:02.415029Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T16:04:23.443Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Vulnerability of defects introduced in the design process in the screen projection module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "value": " Vulnerability of defects introduced in the design process in the screen projection module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:06:58.651Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44107", "datePublished": "2023-10-11T12:06:58.651Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-18T16:04:23.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52097
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52097", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T16:42:48.264903Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-12T19:15:41.930Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of foreground service restrictions being bypassed in the NMS module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of foreground service restrictions being bypassed in the NMS module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:54:08.330Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52097", "datePublished": "2024-02-18T02:54:08.330Z", "dateReserved": "2023-12-27T02:33:15.059Z", "dateUpdated": "2025-03-12T19:15:41.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46742
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized insertion vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46742", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized insertion vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46742", "datePublished": "2022-04-11T19:38:22", "dateReserved": "2022-03-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46755
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46755", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T20:31:15.646377Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-03T20:34:53.624Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the input. Successful exploitation of this vulnerability may cause the launcher to restart." } ], "value": "Vulnerability of input parameters being not strictly verified in the input. Successful exploitation of this vulnerability may cause the launcher to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T10:11:18.525Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46755", "datePublished": "2023-11-08T10:11:18.525Z", "dateReserved": "2023-10-26T11:32:55.336Z", "dateUpdated": "2024-09-03T20:34:53.624Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46867
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.738Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46867", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-10T13:50:27.642352Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T13:50:31.143Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46867", "datePublished": "2023-01-06T00:00:00.000Z", "dateReserved": "2022-12-28T00:00:00.000Z", "dateUpdated": "2025-04-10T13:50:31.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44094
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44094", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:32:58.483149Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:33:23.135Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:43:24.196Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44094", "datePublished": "2023-10-11T10:43:24.196Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:33:23.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52387
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52387", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T17:04:49.426374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-664", "description": "CWE-664 Improper Control of a Resource Through its Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-27T14:48:16.683Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Resource reuse vulnerability in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Resource reuse vulnerability in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Sensitive Information in Resource Not Removed Before Reuse", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:52:24.454Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52387", "datePublished": "2024-02-18T02:52:24.454Z", "dateReserved": "2024-01-26T06:51:31.238Z", "dateUpdated": "2025-03-27T14:48:16.683Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40035
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.442Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability due to a boundary error with the Samba server", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:36", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40035", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability due to a boundary error with the Samba server" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40035", "datePublished": "2022-01-07T22:39:36", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.442Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47291
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47291", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:12:36.216067Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:12:46.209Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission vulnerability in the ActivityManagerService (AMS) module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Permission vulnerability in the ActivityManagerService (AMS) module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:16:31.299Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47291", "datePublished": "2024-09-27T10:16:31.299Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T15:12:46.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44549
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.486Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44549", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T14:38:09.594986Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T14:38:34.187Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The LBS module has a vulnerability in geofencing API access. Successful exploitation of this vulnerability may cause third-party apps to access the geofencing APIs without authorization, affecting user confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Geofencing API access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44549", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T14:38:34.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39407
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39407", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:24:31.103834Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:24:56.889Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Watchkit has a risk of unauthorized file access.Successful exploitation of this vulnerability may affect confidentiality and integrity." } ], "value": "The Watchkit has a risk of unauthorized file access.Successful exploitation of this vulnerability may affect confidentiality and integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T08:45:47.595Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39407", "datePublished": "2023-09-25T08:45:47.595Z", "dateReserved": "2023-07-31T04:41:37.871Z", "dateUpdated": "2024-09-24T15:24:56.889Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22470
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Privileges Controls vulnerability. Local attackers may exploit this vulnerability to expand the Recording Trusted Domain." } ], "problemTypes": [ { "descriptions": [ { "description": "Privileges Controls", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:35", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22470", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Privileges Controls vulnerability. Local attackers may exploit this vulnerability to expand the Recording Trusted Domain." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privileges Controls" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22470", "datePublished": "2021-10-28T12:31:35", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22319
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.495Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22319", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22319", "datePublished": "2022-02-25T18:11:05", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.495Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22450
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.665Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Incomplete Cleanup vulnerability. Local attackers may exploit this vulnerability to cause memory exhaustion." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete Cleanup", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22450", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Incomplete Cleanup vulnerability. Local attackers may exploit this vulnerability to cause memory exhaustion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incomplete Cleanup" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22450", "datePublished": "2021-10-28T12:31:41", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52537
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52537", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T13:58:46.739019Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-01T14:01:16.101Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of package name verification being bypassed in the HwIms module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of package name verification being bypassed in the HwIms module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:40:37.167Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52537", "datePublished": "2024-04-08T08:40:37.167Z", "dateReserved": "2024-02-27T03:41:51.380Z", "dateUpdated": "2024-08-02T23:03:20.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22296
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/cve/CVE-2021-22296" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of HarmonyOS 2.0 has a DoS vulnerability. Local attackers may exploit this vulnerability to mount a file system to the target device, causing DoS of the file system." } ], "problemTypes": [ { "descriptions": [ { "description": "Attempt to Access Child of a Non-structure Pointer", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-04T21:48:20", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/cve/CVE-2021-22296" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22296", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of HarmonyOS 2.0 has a DoS vulnerability. Local attackers may exploit this vulnerability to mount a file system to the target device, causing DoS of the file system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Attempt to Access Child of a Non-structure Pointer" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md", "refsource": "MISC", "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" }, { "name": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" }, { "name": "https://www.tenable.com/cve/CVE-2021-22296", "refsource": "MISC", "url": "https://www.tenable.com/cve/CVE-2021-22296" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22296", "datePublished": "2021-03-02T18:08:24", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47294
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47294", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:10:28.595265Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:10:40.364Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the input method framework module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Access permission verification vulnerability in the input method framework module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:23:04.081Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47294", "datePublished": "2024-09-27T10:23:04.081Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T15:10:40.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56438
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56438", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T15:29:00.359347Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:29:09.014Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper memory address protection in the HUKS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of improper memory address protection in the HUKS module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T02:04:06.730Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56438", "datePublished": "2025-01-08T02:04:06.730Z", "dateReserved": "2024-12-26T08:45:46.157Z", "dateUpdated": "2025-01-08T15:29:09.014Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40049
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.210Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40049", "datePublished": "2022-03-07T13:50:55", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52549
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52549", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T13:57:08.766881Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-01T13:58:16.108Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of data verification errors in the kernel module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of data verification errors in the kernel module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:55:11.618Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52549", "datePublished": "2024-04-08T08:55:11.618Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-08-02T23:03:20.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39990
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.198Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The screen lock module has a Stack-based Buffer Overflow vulnerability.Successful exploitation of this vulnerability may affect user experience." } ], "problemTypes": [ { "descriptions": [ { "description": " Stack-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39990", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The screen lock module has a Stack-based Buffer Overflow vulnerability.Successful exploitation of this vulnerability may affect user experience." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Stack-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39990", "datePublished": "2022-01-03T21:07:39", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40055
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Man-in-the-middle attack vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40055", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Man-in-the-middle attack vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40055", "datePublished": "2022-03-07T13:50:15", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52720
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52720", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:52:05.669063Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:24:04.948Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.555Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the soundtrigger module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Race condition vulnerability in the soundtrigger module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:06:34.278Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52720", "datePublished": "2024-05-11T10:06:34.278Z", "dateReserved": "2024-04-23T03:42:13.136Z", "dateUpdated": "2024-08-02T23:11:35.555Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39966
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.146Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Uninitialized AOD driver structure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39966", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uninitialized AOD driver structure" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39966", "datePublished": "2022-01-03T21:07:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.146Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54110
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54110", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:01:55.845432Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:02:03.925Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cross-process screen stack vulnerability in the UIExtension module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T12:05:08.841Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54110", "datePublished": "2024-12-12T12:05:08.841Z", "dateReserved": "2024-11-29T02:34:46.791Z", "dateUpdated": "2024-12-12T15:02:03.925Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44100
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44100", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:27:17.402567Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:27:58.378Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:47:55.811Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44100", "datePublished": "2023-10-11T11:47:55.811Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:27:58.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46764
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46764", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:42:56.382210Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-15", "description": "CWE-15 External Control of System or Configuration Setting", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:50:14.654Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized startup vulnerability of background apps. Successful exploitation of this vulnerability may cause background apps to start maliciously." } ], "value": "Unauthorized startup vulnerability of background apps. Successful exploitation of this vulnerability may cause background apps to start maliciously." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T10:10:02.277Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46764", "datePublished": "2023-11-08T10:10:02.277Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T14:50:14.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40039
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40039", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40039", "datePublished": "2022-01-07T22:39:39", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22318
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.508Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS 2.0 has a Null Pointer Dereference Vulnerability. Local attackers may exploit this vulnerability to cause system denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "NULL Pointer Dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-14T10:46:02", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22318", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS 2.0 has a Null Pointer Dereference Vulnerability. Local attackers may exploit this vulnerability to cause system denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22318", "datePublished": "2021-07-14T10:46:02", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.508Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22467
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:33:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22467", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22467", "datePublished": "2021-10-28T12:33:12", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.819Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39002
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 11.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice." } ], "problemTypes": [ { "descriptions": [ { "description": "Double free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39002", "datePublished": "2022-09-16T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39970
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "HwPCAssistant has a Improper Input Validation vulnerability.Successful exploitation of this vulnerability may create any file with the system app permission." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:20", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39970", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HwPCAssistant has a Improper Input Validation vulnerability.Successful exploitation of this vulnerability may create any file with the system app permission." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39970", "datePublished": "2022-01-03T21:07:20", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.138Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22417
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.296Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Memory Leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:17:14", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22417", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Memory Leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Processing Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22417", "datePublished": "2021-08-03T17:17:14", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41591
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-41591", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T18:21:41.003173Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T18:23:04.889Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The backup module has a path traversal vulnerability. Successful exploitation of this vulnerability causes unauthorized access to other system files." } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41591", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-09-27T00:00:00.000Z", "dateUpdated": "2025-04-16T18:23:04.889Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52381
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52381", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T20:43:29.275736Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T20:43:36.385Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.556Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Script injection vulnerability in the email module.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "value": "Script injection vulnerability in the email module.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:13:23.818Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52381", "datePublished": "2024-02-18T06:13:23.818Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-11-05T20:43:36.385Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48292
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48292", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-24T20:40:49.131643Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-24T20:41:15.744Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has an out-of-memory (OOM) vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "OOM vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48292", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-24T20:41:15.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40036
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.608Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The bone voice ID TA has a memory overwrite vulnerability. Successful exploitation of this vulnerability may result in malicious code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory overwrite vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T18:01:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40036", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bone voice ID TA has a memory overwrite vulnerability. Successful exploitation of this vulnerability may result in malicious code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory overwrite vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40036", "datePublished": "2022-06-13T18:01:42", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51514
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51514", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:42:23.958757Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:41.393Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of pop-up windows belonging to no app in the VPN module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of pop-up windows belonging to no app in the VPN module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:59:40.741Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51514", "datePublished": "2024-11-05T08:59:40.741Z", "dateReserved": "2024-10-29T01:43:54.524Z", "dateUpdated": "2024-11-05T14:53:41.393Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37018
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:24:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37018", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Processing Errors vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37018", "datePublished": "2021-11-23T15:24:58", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48296
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48296", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-25T13:51:00.562762Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T13:51:20.795Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The SystemUI has a vulnerability in permission management. Successful exploitation of this vulnerability may cause users to receive broadcasts from malicious apps, conveying false alarm information about external storage devices." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission management vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48296", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-25T13:51:20.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51527
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51527", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:40:47.882951Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:52:48.790Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the Gallery app\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the Gallery app\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:25:27.127Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51527", "datePublished": "2024-11-05T09:25:27.127Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T14:52:48.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52367
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52367", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:32:35.749077Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-27T20:18:12.442Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper access control in the media library module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "value": "Vulnerability of improper access control in the media library module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:32:08.585Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52367", "datePublished": "2024-02-18T03:32:08.585Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-08-02T22:55:41.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48491
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.808Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48491", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-17T15:52:52.083237Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-17T15:53:29.175Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of missing authentication on certain HUAWEI phones.Successful exploitation of this vulnerability can lead to ads and other windows to display at any time." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48491", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-17T15:53:29.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52363
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52363", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-15T20:26:49.124607Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-27T17:00:19.335Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of defects introduced in the design process in the Control Panel module.Successful exploitation of this vulnerability may cause app processes to be started by mistake." } ], "value": "Vulnerability of defects introduced in the design process in the Control Panel module.Successful exploitation of this vulnerability may cause app processes to be started by mistake." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:02:13.754Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52363", "datePublished": "2024-02-18T03:02:13.754Z", "dateReserved": "2024-01-26T06:51:31.234Z", "dateUpdated": "2025-03-27T17:00:19.335Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34167
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.204Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-34167", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-11T18:53:20.813908Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-11T18:53:53.803Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled." } ], "problemTypes": [ { "descriptions": [ { "description": "Vulnerability of spoofing trustlists of Huawei desktop", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34167", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-11T18:53:53.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38994
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.333Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38994", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38994", "datePublished": "2022-09-16T17:56:57", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.333Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58043
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58043", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:30:01.006239Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:30:13.991Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.3.0" }, { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission bypass vulnerability in the window module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission bypass vulnerability in the window module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T07:10:50.452Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58043", "datePublished": "2025-03-04T07:10:50.452Z", "dateReserved": "2025-02-27T02:29:09.224Z", "dateUpdated": "2025-03-04T14:30:13.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22254
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.190Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:21", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22254", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22254", "datePublished": "2022-04-11T19:38:21", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29795
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:05:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29795", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29795", "datePublished": "2022-05-13T15:05:43", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36501
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36501", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T18:19:55.777800Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T18:20:03.531Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.170Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory management vulnerability in the boottime module\u003cbr\u003eImpact: Successful exploitation of this vulnerability can affect integrity." } ], "value": "Memory management vulnerability in the boottime module\nImpact: Successful exploitation of this vulnerability can affect integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:21:34.942Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36501", "datePublished": "2024-06-14T07:21:34.942Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-57957
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-57957", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T13:55:12.889477Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T19:51:09.645Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper log information control in the UI framework module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of improper log information control in the UI framework module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-657", "description": "CWE-657 Violation of Secure Design Principles", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T12:27:07.878Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/2/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-57957", "datePublished": "2025-02-06T12:27:07.878Z", "dateReserved": "2025-01-22T03:37:52.394Z", "dateUpdated": "2025-02-12T19:51:09.645Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52955
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52955", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T15:30:57.236841Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:31:08.178Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper authentication in the ANS system service module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of improper authentication in the ANS system service module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T02:00:17.658Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52955", "datePublished": "2025-01-08T02:00:17.658Z", "dateReserved": "2024-12-26T08:46:15.801Z", "dateUpdated": "2025-01-08T15:31:08.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37116
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.834Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "PCManager has a Weaknesses Introduced During Design vulnerability .Successful exploitation of this vulnerability may cause that the PIN of the subscriber is changed." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37116", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PCManager has a Weaknesses Introduced During Design vulnerability .Successful exploitation of this vulnerability may cause that the PIN of the subscriber is changed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37116", "datePublished": "2022-01-03T21:07:15", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39388
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39388", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:48:04.906896Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1285", "description": "CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:49:34.727Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause home screen unavailability." } ], "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause home screen unavailability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:28:21.408Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39388", "datePublished": "2023-08-13T11:28:21.408Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:49:34.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-26549
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:53:53.793Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-26549", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T15:39:04.255570Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-233", "description": "CWE-233 Improper Handling of Parameters", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-19T15:41:58.403Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The SystemUI module has a vulnerability of repeated app restart due to improper parameters. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper parameters vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-26549", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-19T15:41:58.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51523
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51523", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T15:36:03.623394Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T15:36:13.829Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Information management vulnerability in the Gallery module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Information management vulnerability in the Gallery module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:14:43.954Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51523", "datePublished": "2024-11-05T09:14:43.954Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T15:36:13.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37114
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37114", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37114", "datePublished": "2022-01-03T21:07:28", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54101
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54101", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T14:50:38.324760Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T14:51:04.034Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Denial of service (DoS) vulnerability in the installation module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Denial of service (DoS) vulnerability in the installation module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T11:38:12.726Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54101", "datePublished": "2024-12-12T11:38:12.726Z", "dateReserved": "2024-11-29T02:34:46.789Z", "dateUpdated": "2024-12-12T14:51:04.034Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48300
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.750Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48300", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-24T20:36:38.465502Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-24T20:37:02.909Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48300", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-24T20:37:02.909Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22457
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause out-of-bounds write." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22457", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause out-of-bounds write." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22457", "datePublished": "2021-10-28T12:31:16", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22423
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Out-of-bounds Write Vulnerability. Local attackers may exploit this vulnerability to cause integer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:21:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22423", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Out-of-bounds Write Vulnerability. Local attackers may exploit this vulnerability to cause integer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22423", "datePublished": "2021-08-03T17:21:56", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41589
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.200Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DFX unwind stack module of the ArkCompiler has a vulnerability in interface calling.Successful exploitation of this vulnerability affects system services and device availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Interface misuse vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41589", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.200Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40048
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.159Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect buffer size calculation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:51:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40048", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect buffer size calculation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40048", "datePublished": "2022-03-07T13:51:00", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.159Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46884
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46884", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-16T16:37:42.627244Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-16T16:37:58.191Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46884", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2025-01-16T16:37:58.191Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34155
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.066Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34155", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-17T15:26:44.205462Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-17T15:27:40.902Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "unspecified" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "unspecified" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of unauthorized calling on HUAWEI phones and tablets.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34155", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-17T15:27:40.902Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-7265
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-7265", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T14:01:58.335486Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T14:02:07.503Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the lock screen module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability" } ], "value": "Permission verification vulnerability in the lock screen module\nImpact: Successful exploitation of this vulnerability may affect availability" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T08:06:06.977Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-7265", "datePublished": "2024-08-08T08:06:06.977Z", "dateReserved": "2024-05-29T07:55:13.655Z", "dateUpdated": "2024-08-08T14:02:07.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58106
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58106", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T14:12:27.419601Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T14:12:39.922Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the codec module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Buffer overflow vulnerability in the codec module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:31:45.797Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58106", "datePublished": "2025-04-07T03:31:45.797Z", "dateReserved": "2025-03-27T07:13:48.462Z", "dateUpdated": "2025-04-07T14:12:39.922Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3456
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:55:03.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3456", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T14:12:05.563878Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T14:12:13.951Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of kernel raw address leakage in the hang detector module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of kernel raw address leakage in the hang detector module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:34:21.446Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-3456", "datePublished": "2023-07-06T12:34:21.446Z", "dateReserved": "2023-06-29T11:13:39.706Z", "dateUpdated": "2024-11-21T14:12:13.951Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22459
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause System functions which are unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "NULL Pointer Dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22459", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause System functions which are unavailable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22459", "datePublished": "2021-10-28T12:31:23", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38979
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.710Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38979", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38979", "datePublished": "2022-09-16T17:56:43", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.710Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-57962
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-57962", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T14:16:56.188788Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-06T14:17:03.936Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incomplete verification information in the VPN service module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of incomplete verification information in the VPN service module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T12:34:43.361Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/2/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-57962", "datePublished": "2025-02-06T12:34:43.361Z", "dateReserved": "2025-01-22T03:37:52.395Z", "dateUpdated": "2025-02-06T14:17:03.936Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29792
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.572Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Serial number obtaining vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:04:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29792", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Serial number obtaining vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29792", "datePublished": "2022-05-13T15:04:46", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.572Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22294
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component API of the HarmonyOS 2.0 has a permission bypass vulnerability. Local attackers may exploit this vulnerability to issue commands repeatedly, exhausting system service resources." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication Bypass by Spoofing", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-02T18:11:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22294", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component API of the HarmonyOS 2.0 has a permission bypass vulnerability. Local attackers may exploit this vulnerability to issue commands repeatedly, exhausting system service resources." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication Bypass by Spoofing" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md", "refsource": "MISC", "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22294", "datePublished": "2021-03-02T18:11:34", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46852
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.716Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46852", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T17:33:44.442941Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T17:34:36.259Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The memory management module has the logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46852", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T17:34:36.259Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46868
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.806Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46868", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-10T13:47:51.261029Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T13:48:22.184Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46868", "datePublished": "2023-01-06T00:00:00.000Z", "dateReserved": "2022-12-28T00:00:00.000Z", "dateUpdated": "2025-04-10T13:48:22.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52385
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52385", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T19:39:29.529714Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-14T19:34:51.936Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.718Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the RSMC module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Out-of-bounds write vulnerability in the RSMC module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:18:43.493Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52385", "datePublished": "2024-04-08T09:18:43.493Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-11-14T19:34:51.936Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51515
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51515", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:42:18.528264Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:34.113Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the kernel network module\u003cbr\u003eImpact:Successful exploitation of this vulnerability may affect availability." } ], "value": "Race condition vulnerability in the kernel network module\nImpact:Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:00:52.888Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51515", "datePublished": "2024-11-05T09:00:52.888Z", "dateReserved": "2024-10-29T01:43:54.525Z", "dateUpdated": "2024-11-05T14:53:34.113Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37012
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.753Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:25:18", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37012", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Processing Errors vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37012", "datePublished": "2021-11-23T15:25:18", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.753Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40002
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40002", "datePublished": "2022-01-07T22:39:27", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41309
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41309", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T17:44:57.062682Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T17:45:08.287Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the MediaPlaybackController module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Permission control vulnerability in the MediaPlaybackController module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:19:07.089Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41309", "datePublished": "2023-09-26T01:19:07.089Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T17:45:08.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41308
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.108Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41308", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T19:55:49.839413Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T19:57:16.117Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Screenshot vulnerability in the input module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Screenshot vulnerability in the input module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:17:42.728Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41308", "datePublished": "2023-09-26T01:17:42.728Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T19:57:16.117Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37023
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause media files which can be reads and writes in non-distributed directories on any device on the network.." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:26:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37023", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause media files which can be reads and writes in non-distributed directories on any device on the network.." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37023", "datePublished": "2021-11-23T15:26:32", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48494
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48494", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-17T15:41:35.771143Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-17T15:42:55.779Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of lax app identity verification in the pre-authorization function.Successful exploitation of this vulnerability will cause malicious apps to become pre-authorized." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Privilege Assignment", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48494", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-12-17T15:42:55.779Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56444
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56444", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T14:40:23.879567Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T14:40:33.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cross-process screen stack vulnerability in the UIExtension module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T02:44:26.370Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56444", "datePublished": "2025-01-08T02:44:26.370Z", "dateReserved": "2024-12-26T08:45:46.158Z", "dateUpdated": "2025-01-08T14:40:33.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39396
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39396", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:26:55.311412Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:28:38.710Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Deserialization vulnerability in the input module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Deserialization vulnerability in the input module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:35:42.259Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39396", "datePublished": "2023-08-13T11:35:42.259Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-10T14:28:38.710Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54100
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54100", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:24:57.290944Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:25:18.911Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper access control in the secure input module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of improper access control in the secure input module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T11:25:52.084Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54100", "datePublished": "2024-12-12T11:25:52.084Z", "dateReserved": "2024-11-29T02:34:46.789Z", "dateUpdated": "2024-12-12T15:25:18.911Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52101
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.446Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Component exposure vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect service availability and integrity." } ], "value": "Component exposure vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect service availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete List of Disallowed Inputs", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:17:44.624Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52101", "datePublished": "2024-01-16T09:17:44.624Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-08-02T22:48:12.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44103
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44103", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:18:58.134949Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:19:26.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Out-of-bounds read vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:51:36.547Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44103", "datePublished": "2023-10-11T11:51:36.547Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:19:26.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48347
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.778Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48347", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T18:25:06.724203Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-19T18:26:13.680Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MediaProvider module has a vulnerability in permission verification. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48347", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-19T18:26:13.680Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44095
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44095", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:31:08.203080Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:31:50.182Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash." } ], "value": "Use-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:44:10.955Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44095", "datePublished": "2023-10-11T11:44:10.955Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:31:50.182Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38989
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38989", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38989", "datePublished": "2022-09-16T17:56:33", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.663Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29793
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.576Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0, EMUI 10.1.0, EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 3.1.0, Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defect vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:51:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29793", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 12.0.0, EMUI 10.1.0, EMUI 10.1.1" }, { "version_value": "Magic UI 3.1.0, Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defect vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29793", "datePublished": "2022-05-13T15:05:15", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-31171
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31171", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:40:07.772665Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T14:09:53.300Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "File read permission bypass vulnerability in the kernel file system module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "File read permission bypass vulnerability in the kernel file system module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:52:28.713Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2025-31171", "datePublished": "2025-04-07T03:52:28.713Z", "dateReserved": "2025-03-27T07:14:14.770Z", "dateUpdated": "2025-04-07T14:09:53.300Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37087
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.817Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can create arbitrary file." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:05:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can create arbitrary file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37087", "datePublished": "2021-12-07T16:05:44", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.817Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39989
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.308Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwNearbyMain module has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": " Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39989", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwNearbyMain module has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39989", "datePublished": "2022-01-03T21:07:38", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46740
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:41.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The device authentication service module has a defect vulnerability introduced in the design process.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46740", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The device authentication service module has a defect vulnerability introduced in the design process.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46740", "datePublished": "2022-04-11T19:38:23", "dateReserved": "2022-03-26T00:00:00", "dateUpdated": "2024-08-04T05:17:41.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46885
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.965Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46885", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-16T16:29:23.891444Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-16T16:30:18.854Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46885", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2025-01-16T16:30:18.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39982
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Phone Manager application has a Improper Privilege Management vulnerability.Successful exploitation of this vulnerability may read and write arbitrary files by tampering with Phone Manager notifications." } ], "problemTypes": [ { "descriptions": [ { "description": " Improper Privilege Management", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39982", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Phone Manager application has a Improper Privilege Management vulnerability.Successful exploitation of this vulnerability may read and write arbitrary files by tampering with Phone Manager notifications." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39982", "datePublished": "2022-01-03T21:07:26", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58108
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58108", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T14:01:52.215672Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T14:02:20.045Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the codec module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Buffer overflow vulnerability in the codec module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:34:16.940Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58108", "datePublished": "2025-04-07T03:34:16.940Z", "dateReserved": "2025-03-27T07:13:48.462Z", "dateUpdated": "2025-04-07T14:02:20.045Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56445
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56445", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T14:47:07.964920Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T14:47:17.261Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Instruction authentication bypass vulnerability in the Findnetwork module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Instruction authentication bypass vulnerability in the Findnetwork module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T03:00:46.813Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56445", "datePublished": "2025-01-08T03:00:46.813Z", "dateReserved": "2024-12-26T08:45:46.158Z", "dateUpdated": "2025-01-08T14:47:17.261Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22326
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.528Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Privilege Dropping / Lowering Errors vulnerability. Local attackers may exploit this vulnerability to obtain Kernel space read/write capability." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege Dropping / Lowering Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22326", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Privilege Dropping / Lowering Errors vulnerability. Local attackers may exploit this vulnerability to obtain Kernel space read/write capability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege Dropping / Lowering Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22326", "datePublished": "2021-06-30T13:40:54", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.528Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52365
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52365", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-19T20:33:11.393487Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-13T18:29:29.294Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:04:26.472Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52365", "datePublished": "2024-02-18T03:04:26.472Z", "dateReserved": "2024-01-26T06:51:31.234Z", "dateUpdated": "2025-03-13T18:29:29.294Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46785
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Property module has a vulnerability in permission control.This vulnerability can be exploited to obtain the unique device identifier." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:01:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46785", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Property module has a vulnerability in permission control.This vulnerability can be exploited to obtain the unique device identifier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46785", "datePublished": "2022-05-13T15:01:58", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-04T05:17:42.558Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22452
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:32:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22452", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22452", "datePublished": "2021-10-28T12:32:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32998
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32998", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:47:47.527475Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:47.415Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "NULL pointer access vulnerability in the clock module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "NULL pointer access vulnerability in the clock module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-824", "description": "CWE-824 Access of Uninitialized Pointer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:08:09.604Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32998", "datePublished": "2024-05-11T10:08:09.604Z", "dateReserved": "2024-04-23T03:44:12.574Z", "dateUpdated": "2024-08-02T02:27:53.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34741
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.210Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34741", "datePublished": "2022-07-11T13:53:17", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48514
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.224Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48514", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T18:48:15.768919Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T18:48:22.320Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Sepolicy module has inappropriate permission control on the use of Netlink.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Sepolicy module has inappropriate permission control on the use of Netlink.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:44:56.372Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48514", "datePublished": "2023-07-06T12:44:13.420Z", "dateReserved": "2023-06-29T11:23:50.333Z", "dateUpdated": "2024-11-19T18:48:22.320Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45443
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45443", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:34:30.256008Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:34:39.560Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Directory traversal vulnerability in the cust module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "value": "Directory traversal vulnerability in the cust module\nImpact: Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:49:51.125Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45443", "datePublished": "2024-09-04T01:49:51.125Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:34:39.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47293
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47293", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:11:20.752095Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:11:29.485Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the HAL-WIFI module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Out-of-bounds write vulnerability in the HAL-WIFI module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-130", "description": "CWE-130 Improper Handling of Length Parameter Inconsistency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:21:46.924Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47293", "datePublished": "2024-09-27T10:21:46.924Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T15:11:29.485Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-31175
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31175", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:38:52.757580Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T14:09:21.163Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Deserialization mismatch vulnerability in the DSoftBus module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service integrity." } ], "value": "Deserialization mismatch vulnerability in the DSoftBus module\nImpact: Successful exploitation of this vulnerability may affect service integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:58:22.031Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2025-31175", "datePublished": "2025-04-07T03:58:22.031Z", "dateReserved": "2025-03-27T07:14:14.770Z", "dateUpdated": "2025-04-07T14:09:21.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48290
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.673Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48290", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-24T20:42:02.131945Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-24T20:42:33.810Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The phone-PC collaboration module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48290", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-24T20:42:33.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-31174
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31174", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:38:55.749194Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T14:09:29.869Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Path traversal vulnerability in the DFS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Path traversal vulnerability in the DFS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:57:08.372Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2025-31174", "datePublished": "2025-04-07T03:57:08.372Z", "dateReserved": "2025-03-27T07:14:14.770Z", "dateUpdated": "2025-04-07T14:09:29.869Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39971
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.136Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Password vault has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability could compromise confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "External Control of System or Configuration Setting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:21", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39971", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Password vault has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability could compromise confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "External Control of System or Configuration Setting" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39971", "datePublished": "2022-01-03T21:07:21", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.136Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56435
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56435", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T17:19:16.863901Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T17:20:02.805Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cross-process screen stack vulnerability in the UIExtension module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T01:33:41.726Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-56435", "datePublished": "2025-01-08T01:33:41.726Z", "dateReserved": "2024-12-26T08:45:46.156Z", "dateUpdated": "2025-01-08T17:20:02.805Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58113
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58113", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:29:00.497539Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T13:29:08.332Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper resource management in the memory management module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of improper resource management in the memory management module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399 Resource Management Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:38:56.455Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58113", "datePublished": "2025-04-07T03:38:56.455Z", "dateReserved": "2025-03-27T07:13:48.462Z", "dateUpdated": "2025-04-07T13:29:08.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54117
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54117", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T15:20:51.751282Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T15:43:13.712Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cross-process screen stack vulnerability in the UIExtension module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T12:13:38.352Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54117", "datePublished": "2024-12-12T12:13:38.352Z", "dateReserved": "2024-11-29T02:34:46.791Z", "dateUpdated": "2024-12-12T15:43:13.712Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37241
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37241", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:02:07.258948Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T17:02:14.903Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the WMS API. Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Input verification vulnerability in the WMS API. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:30:10.304Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37241", "datePublished": "2023-07-06T12:30:10.304Z", "dateReserved": "2023-06-29T10:23:01.714Z", "dateUpdated": "2024-11-19T17:02:14.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52110
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The sensor module has an out-of-bounds access vulnerability.Successful exploitation of this vulnerability may affect availability." } ], "value": "The sensor module has an out-of-bounds access vulnerability.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Handling of Length Parameter Inconsistency", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:54:39.422Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52110", "datePublished": "2024-01-16T07:54:39.422Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37053
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37053", "datePublished": "2021-12-08T14:12:34", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37126
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.814Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause the directory is traversed." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37126", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause the directory is traversed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37126", "datePublished": "2022-01-03T21:07:17", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.814Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41303
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41303", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:00:18.374761Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:00:59.226Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Command injection vulnerability in the distributed file system module. Successful exploitation of this vulnerability may cause variables in the sock structure to be modified." } ], "value": "Command injection vulnerability in the distributed file system module. Successful exploitation of this vulnerability may cause variables in the sock structure to be modified." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:21:38.790Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41303", "datePublished": "2023-09-25T12:21:38.790Z", "dateReserved": "2023-08-28T12:17:09.165Z", "dateUpdated": "2024-09-24T15:00:59.226Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46327
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.926Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46327", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T13:26:57.349395Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T13:27:38.881Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause privilege escalation, which results in system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration issues", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46327", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-17T13:27:38.881Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47290
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47290", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T16:06:55.706553Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T16:07:05.266Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input validation vulnerability in the USB service module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Input validation vulnerability in the USB service module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:15:05.972Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47290", "datePublished": "2024-09-27T10:15:05.972Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T16:07:05.266Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46756
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46756", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:35:06.375650Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:40:08.537Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the window management module. Successful exploitation of this vulnerability may cause malicious pop-up windows." } ], "value": "Permission control vulnerability in the window management module. Successful exploitation of this vulnerability may cause malicious pop-up windows." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T10:12:50.853Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46756", "datePublished": "2023-11-08T10:12:50.853Z", "dateReserved": "2023-10-26T11:32:55.336Z", "dateUpdated": "2024-09-04T14:40:08.537Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54105
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54105", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T14:54:21.310989Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T14:57:16.158Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Read/Write vulnerability in the image decoding module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Read/Write vulnerability in the image decoding module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T11:59:19.744Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54105", "datePublished": "2024-12-12T11:59:19.744Z", "dateReserved": "2024-11-29T02:34:46.790Z", "dateUpdated": "2024-12-12T14:57:16.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37072
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.803Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Incorrect Calculation of Buffer Size vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Calculation of Buffer Size vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:03:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37072", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Incorrect Calculation of Buffer Size vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Calculation of Buffer Size vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37072", "datePublished": "2021-12-07T16:03:57", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22376
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to bypass user restrictions." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Privilege Management", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22376", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to bypass user restrictions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22376", "datePublished": "2021-06-30T13:57:51", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40012
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect pointer usage vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:12:13", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40012", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect pointer usage vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40012", "datePublished": "2022-07-11T13:53:47", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52362
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52362", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:01:25.382152Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-28T20:16:12.047Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the lock screen module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Permission management vulnerability in the lock screen module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:00:55.155Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52362", "datePublished": "2024-02-18T03:00:55.155Z", "dateReserved": "2024-01-26T06:51:31.234Z", "dateUpdated": "2024-10-28T20:16:12.047Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22420
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause the underlying trust of the application trustlist mechanism is missing.." } ], "problemTypes": [ { "descriptions": [ { "description": "External Control of System or Configuration Setting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:21:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22420", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause the underlying trust of the application trustlist mechanism is missing.." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "External Control of System or Configuration Setting" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22420", "datePublished": "2021-08-03T17:21:45", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29796
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:05:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29796", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstrict verification vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29796", "datePublished": "2022-05-13T15:05:59", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46811
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission management vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:06:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46811", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission management vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46811", "datePublished": "2022-06-13T15:06:25", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.663Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22462
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "NULL Pointer Dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:32:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22462", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22462", "datePublished": "2021-10-28T12:32:17", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37112
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Hisuite module has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability may lead to Firmware leak." } ], "problemTypes": [ { "descriptions": [ { "description": " External Control of System or Configuration Setting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37112", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Hisuite module has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability may lead to Firmware leak." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " External Control of System or Configuration Setting" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37112", "datePublished": "2022-01-03T21:07:32", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39984
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Huawei idap module has a Out-of-bounds Read vulnerability.Successful exploitation of this vulnerability may cause Denial of Service." } ], "problemTypes": [ { "descriptions": [ { "description": " Out-of-bounds Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:35", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39984", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei idap module has a Out-of-bounds Read vulnerability.Successful exploitation of this vulnerability may cause Denial of Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39984", "datePublished": "2022-01-03T21:07:35", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46328
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46328", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T13:25:53.148755Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T13:26:25.638Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the input validation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Input validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46328", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-17T13:26:25.638Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36502
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36502", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T15:31:40.711811Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:31:48.442Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.276Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the audio module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Out-of-bounds read vulnerability in the audio module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:23:20.096Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36502", "datePublished": "2024-06-14T07:23:20.096Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.276Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34738
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34738", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34738", "datePublished": "2022-07-11T13:53:41", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39998
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/12/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI;HarmonyOS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI;HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 11.0.1" }, { "status": "affected", "version": "Magic UI 4.0.0" }, { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Concurrently called for multiple times", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39998", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI;HarmonyOS", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 11.0.1" }, { "version_value": "Magic UI 4.0.0" }, { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Concurrently called for multiple times" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/12/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39998", "datePublished": "2022-01-07T22:39:48", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41305
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.092Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41305", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T18:07:46.531912Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T18:08:00.917Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of 5G messages being sent without being encrypted in a VPN environment in the SMS message module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Vulnerability of 5G messages being sent without being encrypted in a VPN environment in the SMS message module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-326", "description": "CWE-326 Inadequate Encryption Strength", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:12:50.286Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41305", "datePublished": "2023-09-26T01:12:50.286Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T18:08:00.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22454
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.667Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause core dump." } ], "problemTypes": [ { "descriptions": [ { "description": "External Control of System or Configuration Setting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:33:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22454", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause core dump." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "External Control of System or Configuration Setting" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22454", "datePublished": "2021-10-28T12:33:00", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.667Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37089
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.858Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete Cleanup vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:05:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37089", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incomplete Cleanup vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37089", "datePublished": "2021-12-07T16:05:54", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37015
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:22:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37015", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37015", "datePublished": "2021-11-23T15:22:51", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46323
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46323", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T17:57:00.482151Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T18:19:04.330Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46323", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-16T18:19:04.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52539
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.718Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52539", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-15T16:16:28.000372Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-15T16:22:11.397Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the Settings module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission verification vulnerability in the Settings module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:45:14.929Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52539", "datePublished": "2024-04-08T08:45:14.929Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-08-15T16:22:11.397Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39387
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.428Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39387", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:01:25.944023Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:02:20.518Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission control in the window management module. Successful exploitation of this vulnerability may cause malicious pop-up windows." } ], "value": "Vulnerability of permission control in the window management module. Successful exploitation of this vulnerability may cause malicious pop-up windows." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:22:52.628Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39387", "datePublished": "2023-08-13T12:22:52.628Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:02:20.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52368
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52368", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T16:55:19.882384Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-22T19:05:02.749Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the account module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Input verification vulnerability in the account module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:38:36.700Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52368", "datePublished": "2024-02-18T03:38:36.700Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-11-22T19:05:02.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48293
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48293", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-24T20:39:50.329061Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-24T20:39:54.079Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has an OOM vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "OOM vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48293", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-24T20:39:54.079Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48295
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.728Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48295", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-25T13:52:12.278227Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T13:52:16.750Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The IHwAntiMalPlugin interface lacks permission verification. Successful exploitation of this vulnerability can lead to filling problems (batch installation of applications)." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48295", "datePublished": "2023-02-09T00:00:00.000Z", "dateReserved": "2023-01-29T00:00:00.000Z", "dateUpdated": "2025-03-25T13:52:16.750Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46760
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46760", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:30:22.935359Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:31:27.423Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:30:02.430Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46760", "datePublished": "2023-11-08T09:30:02.430Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T19:31:27.423Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40028
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40028", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40028", "datePublished": "2022-01-07T22:39:46", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37063
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.692Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Cryptographic Issues vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to read and delete images of Harmony devices." } ], "problemTypes": [ { "descriptions": [ { "description": "Cryptographic Issues vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37063", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Cryptographic Issues vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to read and delete images of Harmony devices." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cryptographic Issues vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37063", "datePublished": "2021-12-07T16:02:48", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.692Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-12602
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-12602", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T13:54:59.910512Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T18:22:52.646Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Identity verification vulnerability in the ParamWatcher module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Identity verification vulnerability in the ParamWatcher module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-300", "description": "CWE-300 Channel Accessible by Non-Endpoint", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T12:27:58.753Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/2/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-12602", "datePublished": "2025-02-06T12:27:58.753Z", "dateReserved": "2024-12-13T01:02:19.668Z", "dateUpdated": "2025-02-12T18:22:52.646Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39979
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.131Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "HHEE system has a Code Injection vulnerability.Successful exploitation of this vulnerability may affect HHEE system integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Code Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39979", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HHEE system has a Code Injection vulnerability.Successful exploitation of this vulnerability may affect HHEE system integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39979", "datePublished": "2022-01-03T21:07:24", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.131Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52102
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-52102", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-16T20:27:58.462219Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-23T15:14:38.341Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of parameters being not verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of parameters being not verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:18:53.963Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52102", "datePublished": "2024-01-16T09:18:53.963Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-10-23T15:14:38.341Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37058
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.761Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user\u0027s nickname is maliciously tampered with." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions,Privileges,and Access Controls vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:21", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37058", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user\u0027s nickname is maliciously tampered with." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permissions,Privileges,and Access Controls vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37058", "datePublished": "2021-12-07T16:02:21", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-57954
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-57954", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T13:56:23.312208Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T19:51:09.985Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the media library module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission verification vulnerability in the media library module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T12:23:41.778Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/2/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-57954", "datePublished": "2025-02-06T12:23:41.778Z", "dateReserved": "2025-01-22T03:37:52.394Z", "dateUpdated": "2025-02-12T19:51:09.985Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58107
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58107", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T14:11:04.630791Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T14:11:22.444Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the codec module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Buffer overflow vulnerability in the codec module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-680", "description": "CWE-680 Integer Overflow to Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:33:15.998Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58107", "datePublished": "2025-04-07T03:33:15.998Z", "dateReserved": "2025-03-27T07:13:48.462Z", "dateUpdated": "2025-04-07T14:11:22.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3455
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:55:03.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3455", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T21:16:06.309471Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T21:16:12.867Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Key management vulnerability on system. Successful exploitation of this vulnerability may affect service availability and integrity." } ], "value": "Key management vulnerability on system. Successful exploitation of this vulnerability may affect service availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T12:19:46.945Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-3455", "datePublished": "2023-07-05T12:19:46.945Z", "dateReserved": "2023-06-29T10:23:01.404Z", "dateUpdated": "2024-11-20T21:16:12.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52357
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52357", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T18:42:34.704872Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-05T19:30:41.111Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of serialization/deserialization mismatch in the vibration framework.Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of serialization/deserialization mismatch in the vibration framework.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:56:01.549Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52357", "datePublished": "2024-02-18T02:56:01.549Z", "dateReserved": "2024-01-26T06:51:31.233Z", "dateUpdated": "2024-12-05T19:30:41.111Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46812
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:04:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46812", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46812", "datePublished": "2022-06-13T15:04:08", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58044
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58044", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:29:38.079967Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:29:47.900Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.3.0" }, { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification bypass vulnerability in the notification module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Permission verification bypass vulnerability in the notification module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T07:12:36.759Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58044", "datePublished": "2025-03-04T07:12:36.759Z", "dateReserved": "2025-02-27T02:29:09.224Z", "dateUpdated": "2025-03-04T14:29:47.900Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58116
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58116", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:27:57.216193Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T13:28:06.261Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the SVG parsing module of the ArkUI framework\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Buffer overflow vulnerability in the SVG parsing module of the ArkUI framework\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:40:56.025Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58116", "datePublished": "2025-04-07T03:40:56.025Z", "dateReserved": "2025-03-27T07:13:48.463Z", "dateUpdated": "2025-04-07T13:28:06.261Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27895
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-27895", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T15:08:21.697924Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-28T19:29:06.466Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:41:55.752Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:23:07.774Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-27895", "datePublished": "2024-04-08T09:23:07.774Z", "dateReserved": "2024-02-27T03:43:01.541Z", "dateUpdated": "2025-03-28T19:29:06.466Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37019
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:23:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37019", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37019", "datePublished": "2021-11-23T15:23:33", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44554
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44554", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T14:00:20.367954Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T14:01:14.802Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The power module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause abnormal status of a module on the device." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44554", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T14:01:14.802Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39403
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39403", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:16.944928Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:30:27.036Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-358", "description": "CWE-358 Improperly Implemented Security Check for Standard", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:40:18.157Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39403", "datePublished": "2023-08-13T12:40:18.157Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T19:30:27.036Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37051
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37051", "datePublished": "2021-12-08T14:12:25", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44093
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.254Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44093", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:54:16.763490Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:54:59.613Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of package names\u0027 public keys not being verified in the security module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of package names\u0027 public keys not being verified in the security module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Critical Step in Authentication", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:36:21.500Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44093", "datePublished": "2023-10-11T10:36:21.500Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:54:59.613Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38986
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HIPP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause out-of-bounds access to the HIPP module and page table tampering, affecting device confidentiality and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38986", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48516
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.657Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48516", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T16:58:46.769857Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T16:59:00.378Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability that a unique value can be obtained by a third-party app in the DSoftBus module. Successful exploitation of this vulnerability will affect confidentiality." } ], "value": "Vulnerability that a unique value can be obtained by a third-party app in the DSoftBus module. Successful exploitation of this vulnerability will affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:47:17.275Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48516", "datePublished": "2023-07-06T12:47:17.275Z", "dateReserved": "2023-06-29T11:23:50.333Z", "dateUpdated": "2024-11-19T16:59:00.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34743
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:04", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34743", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34743", "datePublished": "2022-07-11T13:53:04", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31757
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.279Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper use of APIs vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:05:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31757", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper use of APIs vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31757", "datePublished": "2022-06-13T15:05:48", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.279Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30415
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30415", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T17:41:34.805641Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T17:46:02.363Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission control in the window management module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:06:02.275Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30415", "datePublished": "2024-04-07T08:06:02.275Z", "dateReserved": "2024-03-27T03:38:10.314Z", "dateUpdated": "2024-11-05T17:46:02.363Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52546
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52546", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T15:06:54.177202Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345 Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-28T19:19:25.156Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:21.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of package name verification being bypassed in the Calendar app.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of package name verification being bypassed in the Calendar app.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:54:05.956Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52546", "datePublished": "2024-04-08T08:54:05.956Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2025-03-28T19:19:25.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31226
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:30.873Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-31226", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-15T21:28:37.751654Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-15T21:28:50.299Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The SDK for the MediaPlaybackController module has improper permission verification. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-31226", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2025-01-15T21:28:50.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54120
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54120", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T14:42:46.620625Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T14:47:34.583Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the distributed notification module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Race condition vulnerability in the distributed notification module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T02:27:52.416Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-54120", "datePublished": "2025-01-08T02:27:52.416Z", "dateReserved": "2024-11-29T02:34:46.792Z", "dateUpdated": "2025-01-08T14:47:34.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39397
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.432Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39397", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:05:03.456139Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:45:56.634Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input parameter verification vulnerability in the communication system. Successful exploitation of this vulnerability may affect availability." } ], "value": "Input parameter verification vulnerability in the communication system. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:32:43.081Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39397", "datePublished": "2023-08-13T12:32:43.081Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-09T19:45:56.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32999
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32999", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:47:09.626581Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:52:16.031Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.478Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cracking vulnerability in the OS security module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Cracking vulnerability in the OS security module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:12:07.046Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32999", "datePublished": "2024-05-11T10:12:07.046Z", "dateReserved": "2024-04-23T03:44:12.574Z", "dateUpdated": "2024-08-02T02:27:53.478Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22478
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.004Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The interface of a certain HarmonyOS module has a UAF vulnerability. Successful exploitation of this vulnerability may lead to information leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Resource Management Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:10:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22478", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The interface of a certain HarmonyOS module has a UAF vulnerability. Successful exploitation of this vulnerability may lead to information leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Resource Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22478", "datePublished": "2022-02-25T18:10:58", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.004Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48353
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.811Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48353", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-24T14:57:31.176491Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-24T14:58:29.921Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause kernel privilege escalation, which results in system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48353", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-02-25T00:00:00.000Z", "dateUpdated": "2025-02-24T14:58:29.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22434
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.403Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22434", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22434", "datePublished": "2022-02-25T18:11:07", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46314
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-46314", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T13:29:18.117415Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "CWE-404 Improper Resource Shutdown or Release", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T13:29:21.749Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The IPC module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46314", "datePublished": "2022-12-20T00:00:00.000Z", "dateReserved": "2022-11-29T00:00:00.000Z", "dateUpdated": "2025-04-17T13:29:21.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37004
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.706Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:25:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37004", "datePublished": "2021-11-23T15:25:38", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.706Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44551
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.742Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44551", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T14:37:01.627779Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T14:37:34.829Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The iaware module has a vulnerability in thread security. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Thread security vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44551", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T14:37:34.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39382
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.237Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39382", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:17:30.687282Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:19:02.446Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Input verification vulnerability in the audio module. Successful exploitation of this vulnerability may cause virtual machines (VMs) to restart." } ], "value": " Input verification vulnerability in the audio module. Successful exploitation of this vulnerability may cause virtual machines (VMs) to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:42:16.914Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39382", "datePublished": "2023-08-13T11:42:16.914Z", "dateReserved": "2023-07-31T04:41:32.210Z", "dateUpdated": "2024-10-10T14:19:02.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5801
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:14:24.025Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5801", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:59:47.994949Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T15:00:19.886Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of identity verification being bypassed in the face unlock module. Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "value": "Vulnerability of identity verification being bypassed in the face unlock module. Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T02:48:14.529Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-5801", "datePublished": "2023-11-08T02:48:14.529Z", "dateReserved": "2023-10-26T11:33:07.080Z", "dateUpdated": "2024-09-04T15:00:19.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-47974
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:02:36.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-47974", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T20:05:20.553825Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-09T20:06:21.511Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth AVRCP module has a vulnerability that can lead to DoS attacks.Successful exploitation of this vulnerability may cause the Bluetooth process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS attack vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-47974", "datePublished": "2023-01-06T00:00:00.000Z", "dateReserved": "2022-12-28T00:00:00.000Z", "dateUpdated": "2025-04-09T20:06:21.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29790
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The graphics acceleration service has a vulnerability in multi-thread access to the database.Successful exploitation of this vulnerability may cause service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Multi-threaded access to the database vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:04:14", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29790", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The graphics acceleration service has a vulnerability in multi-thread access to the database.Successful exploitation of this vulnerability may cause service exceptions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Multi-threaded access to the database vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29790", "datePublished": "2022-05-13T15:04:14", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51517
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51517", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:42:04.772133Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:19.101Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper memory access in the phone service module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of improper memory access in the phone service module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-129", "description": "CWE-129 Improper Validation of Array Index", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:06:04.530Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51517", "datePublished": "2024-11-05T09:06:04.530Z", "dateReserved": "2024-10-29T01:43:54.525Z", "dateUpdated": "2024-11-05T14:53:19.101Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40045
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Support for Integrity Check", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Support for Integrity Check" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40045", "datePublished": "2022-02-09T22:03:55", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37093
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.796Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37093", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37093", "datePublished": "2021-12-08T14:13:11", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.796Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44559
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.783Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44559", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T13:51:04.876542Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T13:52:06.669Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44559", "datePublished": "2022-11-09T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-05-01T13:52:06.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22465
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Heap-based Buffer Overflow vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22465", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Heap-based Buffer Overflow vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22465", "datePublished": "2021-10-28T12:31:53", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37069
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Race Condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37069", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race Condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37069", "datePublished": "2021-12-08T14:12:48", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39402
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39402", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:22.979308Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:34:13.756Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:38:45.202Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39402", "datePublished": "2023-08-13T12:38:45.202Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T19:34:13.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39671
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "4.2.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39671", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T14:58:23.436608Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-25T15:02:20.190Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the security verification module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access control vulnerability in the security verification module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:54:42.395Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39671", "datePublished": "2024-07-25T11:54:42.395Z", "dateReserved": "2024-06-27T08:24:56.589Z", "dateUpdated": "2024-08-02T04:26:15.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-31172
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31172", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:39:02.068486Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T14:09:46.488Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory write permission bypass vulnerability in the kernel futex module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Memory write permission bypass vulnerability in the kernel futex module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:54:03.796Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2025-31172", "datePublished": "2025-04-07T03:54:03.796Z", "dateReserved": "2025-03-27T07:14:14.770Z", "dateUpdated": "2025-04-07T14:09:46.488Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46769
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46769", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:56:12.483627Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:57:04.410Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use-After-Free (UAF) vulnerability in the dubai module. Successful exploitation of this vulnerability will affect availability." } ], "value": "Use-After-Free (UAF) vulnerability in the dubai module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T02:52:20.476Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46769", "datePublished": "2023-11-08T02:52:20.476Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T14:57:04.410Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37098
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.855Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Hilinksvc service exists a Data Processing Errors vulnerability .Successful exploitation of this vulnerability may cause application crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:14", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37098", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Hilinksvc service exists a Data Processing Errors vulnerability .Successful exploitation of this vulnerability may cause application crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Processing Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37098", "datePublished": "2022-01-03T21:07:14", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49245
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the Huawei Share module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Unauthorized access vulnerability in the Huawei Share module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:00:03.721Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49245", "datePublished": "2023-12-06T09:00:03.721Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:45.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37239
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.187Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37239", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:02:56.128666Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T17:03:04.691Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Format string vulnerability in the distributed file system. Attackers who bypass the selinux permission can exploit this vulnerability to crash the program." } ], "value": "Format string vulnerability in the distributed file system. Attackers who bypass the selinux permission can exploit this vulnerability to crash the program." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:27:38.720Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37239", "datePublished": "2023-07-06T12:27:38.720Z", "dateReserved": "2023-06-29T10:23:01.713Z", "dateUpdated": "2024-11-19T17:03:04.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45442
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45442", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:27:11.335619Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:27:20.571Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission verification for APIs in the DownloadProviderMain module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of permission verification for APIs in the DownloadProviderMain module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:38:53.322Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45442", "datePublished": "2024-09-04T01:38:53.322Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:27:20.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39973
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.108Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39973", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39973", "datePublished": "2022-01-03T21:07:43", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.108Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52366
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52366", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-22T17:52:49.069888Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-22T17:55:49.955Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:27:57.409Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52366", "datePublished": "2024-02-18T03:27:57.409Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-08-22T17:55:49.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48478
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202305-0000001532778780" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48478", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-15T16:14:30.673409Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-15T16:14:36.673Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The facial recognition TA of some products lacks memory length verification. Successful exploitation of this vulnerability may cause exceptions of the facial recognition service." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202305-0000001532778780" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48478", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2025-01-15T16:14:36.673Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45449
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45449", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:07:40.451445Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:07:58.483Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the ringtone setting module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the ringtone setting module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T02:21:12.057Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45449", "datePublished": "2024-09-04T02:21:12.057Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:07:58.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48621
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-48621", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T16:55:10.793832Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-06T21:18:23.488Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of missing authentication for critical functions in the Wi-Fi module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of missing authentication for critical functions in the Wi-Fi module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:14:48.097Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48621", "datePublished": "2024-02-18T06:14:48.097Z", "dateReserved": "2024-01-26T06:50:21.724Z", "dateUpdated": "2024-12-06T21:18:23.488Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52098
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.434Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-52098", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T15:18:04.751382Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-23T15:18:51.409Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Denial of Service (DoS) vulnerability in the DMS module. Successful exploitation of this vulnerability will affect availability." } ], "value": "Denial of Service (DoS) vulnerability in the DMS module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:08:10.154Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52098", "datePublished": "2024-01-16T09:08:10.154Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-10-23T15:18:51.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22421
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to cause further Elevation of Privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Privilege Management", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:18:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22421", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to cause further Elevation of Privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22421", "datePublished": "2021-08-03T17:18:19", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31227
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:31.084Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-31227", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-15T20:59:59.502611Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-15T21:00:14.858Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The hwPartsDFR module has a vulnerability in API calling verification. Successful exploitation of this vulnerability may affect device confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-31227", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2025-01-15T21:00:14.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41592
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.446Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41592", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52543
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52543", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T19:39:59.047820Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T16:03:30.857Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.786Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the system module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the system module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:49:44.807Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52543", "datePublished": "2024-04-08T08:49:44.807Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-11-07T16:03:30.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41585
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41585", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.099Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37011
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.751Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:01:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37011", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37011", "datePublished": "2021-12-07T16:01:45", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46894
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-46894", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T18:55:00.567068Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T18:55:13.946Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use After Free (UAF) vulnerability in the uinput module.Successful exploitation of this vulnerability may lead to kernel privilege escalation." } ], "value": "Use After Free (UAF) vulnerability in the uinput module.Successful exploitation of this vulnerability may lead to kernel privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:23:59.118Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46894", "datePublished": "2023-07-06T12:23:59.118Z", "dateReserved": "2023-06-29T11:27:53.897Z", "dateUpdated": "2024-11-19T18:55:13.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37240
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.173Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37240", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:02:32.729206Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T17:02:39.701Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nVulnerability of missing input length verification in the distributed file system. Successful exploitation of this vulnerability may cause out-of-bounds read.\n\n" } ], "value": "\nVulnerability of missing input length verification in the distributed file system. Successful exploitation of this vulnerability may cause out-of-bounds read.\n\n" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:29:12.863Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37240", "datePublished": "2023-07-06T12:29:12.863Z", "dateReserved": "2023-06-29T10:23:01.713Z", "dateUpdated": "2024-11-19T17:02:39.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-58126
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-58126", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:39:10.650621Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T14:10:21.859Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.3.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the security verification module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "value": "Access control vulnerability in the security verification module\nImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T03:47:39.337Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/4/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-58126", "datePublished": "2025-04-07T03:47:39.337Z", "dateReserved": "2025-03-27T07:13:48.464Z", "dateUpdated": "2025-04-07T14:10:21.859Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }