Search criteria
4 vulnerabilities found for Hima-AL00B by Huawei
VAR-201908-0039
Vulnerability from variot - Updated: 2024-11-23 22:55Huawei mobile phones Hima-AL00Bhave with Versions earlier than HMA-AL00C00B175 have a signature verification bypass vulnerability. Attackers can induce users to install malicious applications. Due to a defect in the signature verification logic, the malicious applications can invoke specific interface to execute malicious code. A successful exploit may result in the execution of arbitrary code. Huawei Mobile phone Hima-AL00Bhave Contains vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. HuaweiHima-AL00B is a smartphone from China's Huawei company
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201908-0039",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "hima-al00b",
"scope": "lt",
"trust": 1.8,
"vendor": "huawei",
"version": "hma-al00c00b175"
},
{
"model": "hima-al00b \u003chma-al00c00b175",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-08539"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-007872"
},
{
"db": "NVD",
"id": "CVE-2019-5299"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:hima-al00b_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-007872"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vulnerability was discovered by Huawei internal testing.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201903-695"
}
],
"trust": 0.6
},
"cve": "CVE-2019-5299",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2019-5299",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-08539",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2019-5299",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-5299",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2019-5299",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2019-08539",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201903-695",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-08539"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-007872"
},
{
"db": "CNNVD",
"id": "CNNVD-201903-695"
},
{
"db": "NVD",
"id": "CVE-2019-5299"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei mobile phones Hima-AL00Bhave with Versions earlier than HMA-AL00C00B175 have a signature verification bypass vulnerability. Attackers can induce users to install malicious applications. Due to a defect in the signature verification logic, the malicious applications can invoke specific interface to execute malicious code. A successful exploit may result in the execution of arbitrary code. Huawei Mobile phone Hima-AL00Bhave Contains vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. HuaweiHima-AL00B is a smartphone from China\u0027s Huawei company",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-5299"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-007872"
},
{
"db": "CNVD",
"id": "CNVD-2019-08539"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-5299",
"trust": 3.0
},
{
"db": "JVNDB",
"id": "JVNDB-2019-007872",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2019-08539",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201903-695",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-08539"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-007872"
},
{
"db": "CNNVD",
"id": "CNNVD-201903-695"
},
{
"db": "NVD",
"id": "CVE-2019-5299"
}
]
},
"id": "VAR-201908-0039",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-08539"
}
],
"trust": 1.2999999999999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-08539"
}
]
},
"last_update_date": "2024-11-23T22:55:30.099000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20190320-01-phone",
"trust": 0.8,
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-phone-en"
},
{
"title": "HuaweiHima-AL00B code execution vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/157623"
},
{
"title": "Huawei Hima-AL00B Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=90248"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-08539"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-007872"
},
{
"db": "CNNVD",
"id": "CNNVD-201903-695"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-347",
"trust": 1.0
},
{
"problemtype": "CWE-254",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-007872"
},
{
"db": "NVD",
"id": "CVE-2019-5299"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-5299"
},
{
"trust": 1.6,
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-phone-en"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5299"
},
{
"trust": 0.6,
"url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190320-01-phone-cn"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-08539"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-007872"
},
{
"db": "CNNVD",
"id": "CNNVD-201903-695"
},
{
"db": "NVD",
"id": "CVE-2019-5299"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2019-08539"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-007872"
},
{
"db": "CNNVD",
"id": "CNNVD-201903-695"
},
{
"db": "NVD",
"id": "CVE-2019-5299"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-03-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-08539"
},
{
"date": "2019-08-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-007872"
},
{
"date": "2019-03-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201903-695"
},
{
"date": "2019-08-13T21:15:12.130000",
"db": "NVD",
"id": "CVE-2019-5299"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-03-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-08539"
},
{
"date": "2019-08-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-007872"
},
{
"date": "2020-10-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201903-695"
},
{
"date": "2024-11-21T04:44:41.963000",
"db": "NVD",
"id": "CVE-2019-5299"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201903-695"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei Mobile phone Hima-AL00Bhave Vulnerabilities related to security functions",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-007872"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "data forgery",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201903-695"
}
],
"trust": 0.6
}
}
VAR-201912-0800
Vulnerability from variot - Updated: 2024-11-23 22:55Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal. plural Huawei For smartphone products, NULL A vulnerability related to pointer dereference exists.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei Harry-AL00C and others are all smartphones from China's Huawei.
A number of Huawei products have security vulnerabilities
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201912-0800",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "johnson-l21d 8.2.0.101",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l21c 8.2.0.130",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"model": "columbia-l29d",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.1.0.148\\(c185\\)"
},
{
"model": "ever-al00b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.0.0.195\\(c00e195r2p1\\)"
},
{
"model": "jackman-l23",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.162\\(c605\\)"
},
{
"model": "ever-l29b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.0.0.207\\(c636e3r2p1\\)"
},
{
"model": "johnson-l42ie",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.155\\(c675r2p1\\)"
},
{
"model": "harry-al10b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l21d",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.131\\(c55custc55d1\\)"
},
{
"model": "columbia-l29d",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.1.0.146\\(c461\\)"
},
{
"model": "columbia-al10b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.1.0.163\\(c00\\)"
},
{
"model": "jackman-l23",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.152\\(c45custc45d1\\)"
},
{
"model": "johnson-tl00f",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.100\\(c541custc541d1\\)"
},
{
"model": "potter-al00c",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.208\\(c00e205r3p1\\)"
},
{
"model": "emily-al00a",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.1.0.190\\(c00\\)"
},
{
"model": "jackman-l22",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.156\\(c636r2p2\\)"
},
{
"model": "vogue-al10c",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.162\\(c00e160r2p1\\)"
},
{
"model": "johnson-l21c",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.136\\(c432custc432d1\\)"
},
{
"model": "neo-al00d",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.1.0.175\\(c786\\)"
},
{
"model": "johnson-l21c",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.130\\(c461r1p1\\)"
},
{
"model": "charlotte-tl00b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.1.0.176\\(c01\\)"
},
{
"model": "harry-tl00c",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.0.1.162\\(c01e160r2p3\\)"
},
{
"model": "johnson-l23c",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.133\\(c605custc605d1\\)"
},
{
"model": "jackman-l21",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.160\\(c185\\)"
},
{
"model": "columbia-al10i",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.1.0.150\\(c675custc675d2\\)"
},
{
"model": "johnson-l21d",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.101\\(c432custc432d1\\)"
},
{
"model": "johnson-tl00d",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.100\\(c541custc541d1\\)"
},
{
"model": "ever-l29b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.0.0.206\\(c185e3r3p1\\)"
},
{
"model": "johnson-l22d",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.107\\(c636r2p1\\)"
},
{
"model": "tony-tl00b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.206\\(c01e200r2p3\\)"
},
{
"model": "vogue-tl00b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.162\\(c01e160r2p1\\)"
},
{
"model": "emily-tl00b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.1.0.175\\(c01\\)"
},
{
"model": "alp-al00b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.0.0.153\\(c00\\)"
},
{
"model": "ever-l29b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.0.0.208\\(c432e3r1p12\\)"
},
{
"model": "columbia-l29d",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.1.0.151\\(c432\\)"
},
{
"model": "johnson-l23c",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.130\\(c636custc636d2\\)"
},
{
"model": "johnson-tl00d",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.165\\(c01r1p16\\)"
},
{
"model": "johnson-l21d",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.101\\(c10custc10d1\\)"
},
{
"model": "princeton-al10b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.211\\(c00e203r2p2\\)"
},
{
"model": "vogue-al00a-preload",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.12\\(c00r1\\)"
},
{
"model": "johnson-l21c",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.131\\(c10r2p2\\)"
},
{
"model": "princeton-al10d",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.212\\(c00e204r2p2\\)"
},
{
"model": "vogue-al10c-preload",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.12\\(c00r1\\)"
},
{
"model": "harry-al00c",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.206\\(c00e205r3p1\\)"
},
{
"model": "johnson-l22d",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.105\\(c185r2p1\\)"
},
{
"model": "bla-tl00b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.0.0.129\\(sp2c01\\)"
},
{
"model": "laya-al00ep",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.0.0.201\\(c786e200r2p1\\)"
},
{
"model": "johnson-al00ic",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.161\\(c675custc675d1\\)"
},
{
"model": "johnson-l42if",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.155\\(c675r2p1\\)"
},
{
"model": "columbia-tl00d",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.1.0.186\\(c01gt\\)"
},
{
"model": "harry-al10b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.206\\(c00e205r3p1\\)"
},
{
"model": "princeton-al10i",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.0.1.150\\(c675e9r1p4\\)"
},
{
"model": "princeton-tl10c",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.211\\(c01e203r2p2\\)"
},
{
"model": "alp-tl00b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.0.0.129\\(sp2c01\\)"
},
{
"model": "elle-tl00b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.162\\(c01e160r2p1\\)"
},
{
"model": "bla-al00b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.0.0.153\\(c00\\)"
},
{
"model": "bla-al00b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.0.0.129\\(sp2c786\\)"
},
{
"model": "hima-al00b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.0.0.200\\(c00e200r2p1\\)"
},
{
"model": "tony-al00b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.206\\(c00e200r2p3\\)"
},
{
"model": "charlotte-al00a",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.1.0.176\\(c00\\)"
},
{
"model": "elle-al00b",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.162\\(c00e160r2p1\\)"
},
{
"model": "johnson-al10c",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.165\\(c00r1p16\\)"
},
{
"model": "vogue-al00a",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.162\\(c00e160r2p1\\)"
},
{
"model": "johnson-l42ic",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.155\\(c675r2p1\\)"
},
{
"model": "johnson-l22c",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.107\\(c636r2p1\\)"
},
{
"model": "columbia-l29d",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.1.0.151\\(c10\\)"
},
{
"model": "johnson-l22c",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "8.2.0.105\\(c185r1p1\\)"
},
{
"model": "potter-al10a",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "9.1.0.208\\(c00e205r3p1\\)"
},
{
"model": "alp-al00b",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "alp-tl00b",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "bla-al00b",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "bla-tl00b",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "charlotte al00a",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "charlotte tl00b",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "columbia al10b",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "columbia al10i",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "columbia l29d",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "columbia tl00d",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "vogue-al10c 9.1.0.162",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vogue-al10c-preload 9.1.0.12",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vogue-lgrp1-chn",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vogue-lgrp2-ovs",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "9.1.0.161"
},
{
"model": "vogue-tl00b 9.1.0.162",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vogue-al00a-preload 9.1.0.12",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vogue-al00a-preload 9.1.0.4",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vogue-al00a 9.1.0.162",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "potter-al10a 9.1.0.208",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "potter-al00c 9.1.0.208",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-tl00f 8.2.0.100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-tl00d 8.2.0.100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-tl00d 8.2.0.165",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l42if 8.2.0.110",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l42if 8.2.0.155",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l42ie 8.2.0.155",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l42ic 8.2.0.155",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l23c 8.2.0.130",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l23c 8.2.0.133",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l22d 8.2.0.103",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l22d 8.2.0.105",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l22d 8.2.0.107",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l22c 8.2.0.105",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l22c 8.2.0.107",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l21d 8.2.0.131",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l21c 8.2.0.131",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-l21c 8.2.0.136",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-al10c 8.2.0.165",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-al00ic 8.2.0.161",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-al00c 8.2.0.175",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "johnson-al00c 8.2.0.190",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "jackman-l23 8.2.0.152",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "jackman-l23 8.2.0.162",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "jackman-l22 8.2.0.156",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "jackman-l21 8.2.0.160",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "jackman-l03 8.2.0.163",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "jackman-al00d 8.2.0.170",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "jackman-al00d 8.2.0.188",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "harry-tl00c 9.0.1.162",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "harry-lgrp1-chn",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "9.1.0.206"
},
{
"model": "harry-al10b 9.1.0.206",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "harry-al00c-preload 9.0.1.5",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "harry-al00c-preload 9.1.0.1",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "harry-al00c 9.1.0.206",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-44950"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013429"
},
{
"db": "NVD",
"id": "CVE-2019-5235"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:alp-al00b_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:alp-tl00b_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:bla-al00b_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:bla-tl00b_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:charlotte-al00a_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:charlotte-tl00b_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:columbia-al10b_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:columbia-al10i_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:columbia-l29d_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:columbia-tl00d_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013429"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vulnerability was discovered by Huawei internal testing.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201908-1739"
}
],
"trust": 0.6
},
"cve": "CVE-2019-5235",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2019-5235",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-44950",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2019-5235",
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "Low",
"baseScore": 5.3,
"baseSeverity": "Medium",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2019-5235",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-5235",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2019-5235",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2019-44950",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201908-1739",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-44950"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013429"
},
{
"db": "CNNVD",
"id": "CNNVD-201908-1739"
},
{
"db": "NVD",
"id": "CVE-2019-5235"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal. plural Huawei For smartphone products, NULL A vulnerability related to pointer dereference exists.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei Harry-AL00C and others are all smartphones from China\u0027s Huawei. \n\nA number of Huawei products have security vulnerabilities",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-5235"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013429"
},
{
"db": "CNVD",
"id": "CNVD-2019-44950"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-5235",
"trust": 3.0
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013429",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2019-44950",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201908-1739",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-44950"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013429"
},
{
"db": "CNNVD",
"id": "CNNVD-201908-1739"
},
{
"db": "NVD",
"id": "CVE-2019-5235"
}
]
},
"id": "VAR-201912-0800",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-44950"
}
],
"trust": 1.3101601173809525
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-44950"
}
]
},
"last_update_date": "2024-11-23T22:55:20.022000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20190821-01-smartphone",
"trust": 0.8,
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en"
},
{
"title": "Patch for Unknown vulnerabilities in multiple Huawei products",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/193797"
},
{
"title": "Multiple Huawei Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97323"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-44950"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013429"
},
{
"db": "CNNVD",
"id": "CNNVD-201908-1739"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-476",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013429"
},
{
"db": "NVD",
"id": "CVE-2019-5235"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-5235"
},
{
"trust": 1.2,
"url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190821-01-smartphone-cn"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5235"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-44950"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013429"
},
{
"db": "CNNVD",
"id": "CNNVD-201908-1739"
},
{
"db": "NVD",
"id": "CVE-2019-5235"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2019-44950"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013429"
},
{
"db": "CNNVD",
"id": "CNNVD-201908-1739"
},
{
"db": "NVD",
"id": "CVE-2019-5235"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-12-11T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-44950"
},
{
"date": "2020-01-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-013429"
},
{
"date": "2019-08-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201908-1739"
},
{
"date": "2019-12-14T00:15:10.977000",
"db": "NVD",
"id": "CVE-2019-5235"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-12-11T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-44950"
},
{
"date": "2020-01-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-013429"
},
{
"date": "2019-12-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201908-1739"
},
{
"date": "2024-11-21T04:44:34.617000",
"db": "NVD",
"id": "CVE-2019-5235"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201908-1739"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei In smartphone products NULL Pointer dereference vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013429"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "code problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201908-1739"
}
],
"trust": 0.6
}
}
CVE-2019-5299 (GCVE-0-2019-5299)
Vulnerability from nvd – Published: 2019-08-13 20:34 – Updated: 2024-08-04 19:54- signature verification bypass
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Huawei | Hima-AL00B |
Affected:
Versions earlier than HMA-AL00C00B175
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:54:53.454Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-phone-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Hima-AL00B",
"vendor": "Huawei",
"versions": [
{
"status": "affected",
"version": "Versions earlier than HMA-AL00C00B175"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Huawei mobile phones Hima-AL00Bhave with Versions earlier than HMA-AL00C00B175 have a signature verification bypass vulnerability. Attackers can induce users to install malicious applications. Due to a defect in the signature verification logic, the malicious applications can invoke specific interface to execute malicious code. A successful exploit may result in the execution of arbitrary code."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "signature verification bypass",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-08-13T20:34:23",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-phone-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5299",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Hima-AL00B",
"version": {
"version_data": [
{
"version_value": "Versions earlier than HMA-AL00C00B175"
}
]
}
}
]
},
"vendor_name": "Huawei"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Huawei mobile phones Hima-AL00Bhave with Versions earlier than HMA-AL00C00B175 have a signature verification bypass vulnerability. Attackers can induce users to install malicious applications. Due to a defect in the signature verification logic, the malicious applications can invoke specific interface to execute malicious code. A successful exploit may result in the execution of arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "signature verification bypass"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-phone-en",
"refsource": "CONFIRM",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-phone-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5299",
"datePublished": "2019-08-13T20:34:23",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:54:53.454Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5299 (GCVE-0-2019-5299)
Vulnerability from cvelistv5 – Published: 2019-08-13 20:34 – Updated: 2024-08-04 19:54- signature verification bypass
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Huawei | Hima-AL00B |
Affected:
Versions earlier than HMA-AL00C00B175
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:54:53.454Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-phone-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Hima-AL00B",
"vendor": "Huawei",
"versions": [
{
"status": "affected",
"version": "Versions earlier than HMA-AL00C00B175"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Huawei mobile phones Hima-AL00Bhave with Versions earlier than HMA-AL00C00B175 have a signature verification bypass vulnerability. Attackers can induce users to install malicious applications. Due to a defect in the signature verification logic, the malicious applications can invoke specific interface to execute malicious code. A successful exploit may result in the execution of arbitrary code."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "signature verification bypass",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-08-13T20:34:23",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-phone-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5299",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Hima-AL00B",
"version": {
"version_data": [
{
"version_value": "Versions earlier than HMA-AL00C00B175"
}
]
}
}
]
},
"vendor_name": "Huawei"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Huawei mobile phones Hima-AL00Bhave with Versions earlier than HMA-AL00C00B175 have a signature verification bypass vulnerability. Attackers can induce users to install malicious applications. Due to a defect in the signature verification logic, the malicious applications can invoke specific interface to execute malicious code. A successful exploit may result in the execution of arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "signature verification bypass"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-phone-en",
"refsource": "CONFIRM",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-phone-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5299",
"datePublished": "2019-08-13T20:34:23",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:54:53.454Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}