Search criteria

2 vulnerabilities found for berlin-l21 by huawei

VAR-201711-0237

Vulnerability from variot - Updated: 2025-04-20 23:35

Some Huawei smart phones with software Berlin-L21C10B130,Berlin-L21C185B133,Berlin-L21HNC10B131,Berlin-L21HNC185B140,Berlin-L21HNC432B151,Berlin-L22C636B160,Berlin-L22HNC636B130,Berlin-L22HNC675B150CUSTC675D001,Berlin-L23C605B131,Berlin-L24HNC567B110,FRD-L02C432B120,FRD-L02C635B130,FRD-L02C675B170CUSTC675D001,FRD-L04C567B162,FRD-L04C605B131,FRD-L09C10B130,FRD-L09C185B130,FRD-L09C432B131,FRD-L09C636B130,FRD-L14C567B162,FRD-L19C10B130,FRD-L19C432B131,FRD-L19C636B130 have a factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can login the configuration flow by Swype Keyboard and can perform some operations to update the Google account. As a result, the FRP function is bypassed. Huawei Smartphone software contains vulnerabilities related to authorization, permissions, and access control.Information may be tampered with. HuaweiBerlin-L21, L21HN, L22, L22HN, L23, L24HN, and FRD-L02, L04, L09, L14, and L19 are all Huawei smartphones. Huawei Berlin-L21 and others are all smartphone products of China's Huawei (Huawei). Several Huawei products have security vulnerabilities. The following products and versions are affected: Huawei Berlin-L21 Berlin-L21C10B130 version, Berlin-L21C185B133 version, Berlin-L21HN Berlin-L21HNC10B131 version, Berlin-L21HNC185B140 version, Berlin-L21HNC432B151 version; Berlin-L22HNC636B130 Version, Berlin-L22HNC675B150CUSTC675D001 Version; Berlin-L23 Berlin-L23C605B131 Version; Berlin-L24HN Berlin-L24HNC567B110 Version; FRD-L02 FRD-L02C432B120 Version, FRD-L02C635B130 Version, FRD-L02C675B170CUSTC675D001 Version; FRD-L04 FRD-L04C567B162 Version, FRD-L04C605B131 version; FRD-L09 FRD-L09C10B130 version, FRD-L09C185B130 version, FRD-L09C432B131 version, FRD-L09C636B130 version; FRD-L14 FRD-L14C567B162 version; , FRD-L19C636B130 version

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0237",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "berlin-l21",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "berlin-l21c10b130"
      },
      {
        "model": "berlin-l21",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "berlin-l21c185b133"
      },
      {
        "model": "berlin-l21hn",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "berlin-l21hnc10b131"
      },
      {
        "model": "berlin-l21hn",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "berlin-l21hnc185b140"
      },
      {
        "model": "berlin-l21hn",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "berlin-l21hnc432b151"
      },
      {
        "model": "berlin-l22",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "berlin-l22c636b160"
      },
      {
        "model": "berlin-l22hn",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "berlin-l22hnc636b130"
      },
      {
        "model": "berlin-l22hn",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "berlin-l22hnc675b150custc675d001"
      },
      {
        "model": "berlin-l23",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "berlin-l23c605b131"
      },
      {
        "model": "berlin-l24hn",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "berlin-l24hnc567b110"
      },
      {
        "model": "frd-l02",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "frd-l02c432b120"
      },
      {
        "model": "frd-l02",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "frd-l02c635b130"
      },
      {
        "model": "frd-l02",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "frd-l02c675b170custc675d001"
      },
      {
        "model": "frd-l04",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "frd-l04c567b162"
      },
      {
        "model": "frd-l04",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "frd-l04c605b131"
      },
      {
        "model": "frd-l09",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "frd-l09c10b130"
      },
      {
        "model": "frd-l09",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "frd-l09c185b130"
      },
      {
        "model": "frd-l09",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "frd-l09c432b131"
      },
      {
        "model": "frd-l09",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "frd-l09c636b130"
      },
      {
        "model": "frd-l14",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "frd-l14c567b162"
      },
      {
        "model": "frd-l19",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "frd-l19c10b130"
      },
      {
        "model": "frd-l19",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "frd-l19c432b131"
      },
      {
        "model": "frd-l19",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "frd-l19c636b130"
      },
      {
        "model": "berlin-l21 berlin-l21c10b130",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l21 berlin-l21c185b133",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l22 berlin-l22c636b160",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l23 berlin-l23c605b131",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l21hn berlin-l21hnc10b131",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l21hn berlin-l21hnc185b140",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l21hn berlin-l21hnc432b151",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l22hn berlin-l22hnc636b130",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l22hn berlin-l22hnc675b150custc675d001",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l24hn berlin-l24hnc567b110",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "frd-l02 frd-l02c432b120",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "frd-l02 frd-l02c635b130",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "frd-l02 frd-l02c675b170custc675d001",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "frd-l04 frd-l04c567b162",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "frd-l04 frd-l04c605b131",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "frd-l09 frd-l09c10b130",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "frd-l09 frd-l09c185b130",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "frd-l09 frd-l09c432b131",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "frd-l09 frd-l09c636b130",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "frd-l14 frd-l14c567b162",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "frd-l19 frd-l19c10b130",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "frd-l19 frd-l19c432b131",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "frd-l19 frd-l19c636b130",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33956"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010808"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1003"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2721"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:berlin-l21_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:berlin-l21hn_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:berlin-l22_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:berlin-l22hn_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:berlin-l23_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:berlin-l24hn_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:frd-l02_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:frd-l04_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:frd-l09_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:frd-l14_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:frd-l19_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010808"
      }
    ]
  },
  "cve": "CVE-2017-2721",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-2721",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-33956",
            "impactScore": 6.9,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "VHN-110924",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 0.9,
            "id": "CVE-2017-2721",
            "impactScore": 3.6,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-2721",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-2721",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-33956",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201711-1003",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-110924",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33956"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110924"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010808"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1003"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2721"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Some Huawei smart phones with software Berlin-L21C10B130,Berlin-L21C185B133,Berlin-L21HNC10B131,Berlin-L21HNC185B140,Berlin-L21HNC432B151,Berlin-L22C636B160,Berlin-L22HNC636B130,Berlin-L22HNC675B150CUSTC675D001,Berlin-L23C605B131,Berlin-L24HNC567B110,FRD-L02C432B120,FRD-L02C635B130,FRD-L02C675B170CUSTC675D001,FRD-L04C567B162,FRD-L04C605B131,FRD-L09C10B130,FRD-L09C185B130,FRD-L09C432B131,FRD-L09C636B130,FRD-L14C567B162,FRD-L19C10B130,FRD-L19C432B131,FRD-L19C636B130 have a factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can login the configuration flow by Swype Keyboard and can perform some operations to update the Google account. As a result, the FRP function is bypassed. Huawei Smartphone software contains vulnerabilities related to authorization, permissions, and access control.Information may be tampered with. HuaweiBerlin-L21, L21HN, L22, L22HN, L23, L24HN, and FRD-L02, L04, L09, L14, and L19 are all Huawei smartphones. Huawei Berlin-L21 and others are all smartphone products of China\u0027s Huawei (Huawei). Several Huawei products have security vulnerabilities. The following products and versions are affected: Huawei Berlin-L21 Berlin-L21C10B130 version, Berlin-L21C185B133 version, Berlin-L21HN Berlin-L21HNC10B131 version, Berlin-L21HNC185B140 version, Berlin-L21HNC432B151 version; Berlin-L22HNC636B130 Version, Berlin-L22HNC675B150CUSTC675D001 Version; Berlin-L23 Berlin-L23C605B131 Version; Berlin-L24HN Berlin-L24HNC567B110 Version; FRD-L02 FRD-L02C432B120 Version, FRD-L02C635B130 Version, FRD-L02C675B170CUSTC675D001 Version; FRD-L04 FRD-L04C567B162 Version, FRD-L04C605B131 version; FRD-L09 FRD-L09C10B130 version, FRD-L09C185B130 version, FRD-L09C432B131 version, FRD-L09C636B130 version; FRD-L14 FRD-L14C567B162 version; , FRD-L19C636B130 version",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-2721"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010808"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-33956"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110924"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-2721",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010808",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1003",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-33956",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-110924",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33956"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110924"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010808"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1003"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2721"
      }
    ]
  },
  "id": "VAR-201711-0237",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33956"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110924"
      }
    ],
    "trust": 1.6257142880000002
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33956"
      }
    ]
  },
  "last_update_date": "2025-04-20T23:35:40.868000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20170920-01-frpbypass",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170920-01-frpbypass-en"
      },
      {
        "title": "A variety of Huawei mobile phone security bypass vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/106061"
      },
      {
        "title": "Multiple Huawei Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76713"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33956"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010808"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1003"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-287",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-264",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-110924"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010808"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2721"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170920-01-frpbypass-en"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2721"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2721"
      },
      {
        "trust": 0.6,
        "url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20170920-01-frpbypass-cn"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33956"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110924"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010808"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1003"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2721"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33956"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110924"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010808"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1003"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2721"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-33956"
      },
      {
        "date": "2017-11-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-110924"
      },
      {
        "date": "2017-12-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010808"
      },
      {
        "date": "2017-11-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-1003"
      },
      {
        "date": "2017-11-22T19:29:01.397000",
        "db": "NVD",
        "id": "CVE-2017-2721"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-33956"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-110924"
      },
      {
        "date": "2017-12-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010808"
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-1003"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2017-2721"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1003"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei Vulnerabilities related to authorization, authority, and access control in smartphone software",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010808"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1003"
      }
    ],
    "trust": 0.6
  }
}

VAR-201802-0447

Vulnerability from variot - Updated: 2024-11-23 23:05

Some huawei smartphones with software BTV-DL09C233B350, Berlin-L21HNC432B360, Berlin-L22HNC636B360, Berlin-L24HNC567B360, Berlin-L21C10B130, Berlin-L21C185B132, Berlin-L21C464B130, Berlin-L22C346B140, Berlin-L22C636B160, Berlin-L23C605B131, Berlin-L23DOMC109B160, MHA-AL00AC00B125 have a DoS vulnerability. Due to insufficient input validation, an attacker could trick a user to execute a malicious application, which could be exploited by attacker to launch DoS attacks. Huawei Smartphone software contains a vulnerability related to input validation.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiBTV-EMUI5.0, Berlin-EMUI5.0, Berlin-L system and other products of China's Huawei company. A denial of service vulnerability exists in several Huawei products because the device failed to adequately verify user input. Huawei BTV-EMUI5.0, etc. Huawei BTV-EMUI5.0 is a smart tablet product. MHA-AL00A is a smart phone product. The vulnerability is caused by the program's insufficient implementation of input validation. The following products and versions are affected: Huawei BTV-EMUI5.0 BTV-DL09C233B350 version; Berlin-EMUI5.0 Berlin-L21HNC432B360 version, Berlin-L22HNC636B360 version, Berlin-L24HNC567B360 version; Berlin-L21 Berlin-L21C10B130 version, Berlin-L218 version , Berlin-L21C464B130 version; Berlin-L22 Berlin-L22C346B140 version, Berlin-L22C636B160 version; Berlin-L23 Berlin-L23C605B131 version, Berlin-L23DOMC109B160 version; MHA-AL00A MHA-AL00AC00B125 version

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0447",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "berlin-l21",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "berlin-l21c464b130"
      },
      {
        "model": "berlin-l21",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "berlin-l21c185b132"
      },
      {
        "model": "berlin-l23",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "berlin-l23domc109b160"
      },
      {
        "model": "berlin-emui5.0",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "berlin-l22hnc636b360"
      },
      {
        "model": "berlin-l22",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "berlin-l22c636b160"
      },
      {
        "model": "berlin-l23",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "berlin-l23c605b131"
      },
      {
        "model": "mha-al00a",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "mha-al00ac00b125"
      },
      {
        "model": "berlin-l21",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "berlin-l21c10b130"
      },
      {
        "model": "berlin-l22",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "berlin-l22c346b140"
      },
      {
        "model": "berlin-emui5.0",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "berlin-l24hnc567b360"
      },
      {
        "model": "berlin-emui5.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "berlin-l21hnc432b360"
      },
      {
        "model": "btv-emui5.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "btv-dl09c233b350"
      },
      {
        "model": "berlin-emui5.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l21",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l22",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l23",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "btv-emui5.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "mha-al00a",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l21 berlin-l21c10b130",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l22 berlin-l22c636b160",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l23 berlin-l23c605b131",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "mha-al00a mha-al00ac00b125",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "btv-emui5.0 btv-dl09c233b350",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-emui5.0 berlin-l21hnc432b360",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-emui5.0 berlin-l22hnc636b360",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-emui5.0 berlin-l24hnc567b360",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l21 berlin-l21c185b132",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l21 berlin-l21c464b130",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l22 berlin-l22c346b140",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berlin-l23 berlin-l23domc109b160",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-02548"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012678"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-945"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-17201"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:berlin-emui5.0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:berlin-l21_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:berlin-l22_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:berlin-l23_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:btv-emui5.0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:mha-al00a_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012678"
      }
    ]
  },
  "cve": "CVE-2017-17201",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2017-17201",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2018-02548",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-108200",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.8,
            "id": "CVE-2017-17201",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-17201",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-17201",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-02548",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201712-945",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-108200",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-02548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-108200"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012678"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-945"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-17201"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Some huawei smartphones with software BTV-DL09C233B350, Berlin-L21HNC432B360, Berlin-L22HNC636B360, Berlin-L24HNC567B360, Berlin-L21C10B130, Berlin-L21C185B132, Berlin-L21C464B130, Berlin-L22C346B140, Berlin-L22C636B160, Berlin-L23C605B131, Berlin-L23DOMC109B160, MHA-AL00AC00B125 have a DoS vulnerability. Due to insufficient input validation, an attacker could trick a user to execute a malicious application, which could be exploited by attacker to launch DoS attacks. Huawei Smartphone software contains a vulnerability related to input validation.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiBTV-EMUI5.0, Berlin-EMUI5.0, Berlin-L system and other products of China\u0027s Huawei company. A denial of service vulnerability exists in several Huawei products because the device failed to adequately verify user input. Huawei BTV-EMUI5.0, etc. Huawei BTV-EMUI5.0 is a smart tablet product. MHA-AL00A is a smart phone product. The vulnerability is caused by the program\u0027s insufficient implementation of input validation. The following products and versions are affected: Huawei BTV-EMUI5.0 BTV-DL09C233B350 version; Berlin-EMUI5.0 Berlin-L21HNC432B360 version, Berlin-L22HNC636B360 version, Berlin-L24HNC567B360 version; Berlin-L21 Berlin-L21C10B130 version, Berlin-L218 version , Berlin-L21C464B130 version; Berlin-L22 Berlin-L22C346B140 version, Berlin-L22C636B160 version; Berlin-L23 Berlin-L23C605B131 version, Berlin-L23DOMC109B160 version; MHA-AL00A MHA-AL00AC00B125 version",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-17201"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012678"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-02548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-108200"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-17201",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012678",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-945",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-02548",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-108200",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-02548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-108200"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012678"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-945"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-17201"
      }
    ]
  },
  "id": "VAR-201802-0447",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-02548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-108200"
      }
    ],
    "trust": 1.5967086875
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-02548"
      }
    ]
  },
  "last_update_date": "2024-11-23T23:05:14.783000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20180124-01-dos",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180124-01-dos-en"
      },
      {
        "title": "Patches for various Huawei Product Denial of Service Vulnerabilities (CNVD-2018-02548)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/115285"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-02548"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012678"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-108200"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012678"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-17201"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180124-01-dos-en"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17201"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-17201"
      },
      {
        "trust": 0.6,
        "url": "http://www.huawei.com/cn/psirt/security-advisories/2018/huawei-sa-20180124-01-dos-cn"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-02548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-108200"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012678"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-945"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-17201"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-02548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-108200"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012678"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-945"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-17201"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-02-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-02548"
      },
      {
        "date": "2018-02-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-108200"
      },
      {
        "date": "2018-04-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-012678"
      },
      {
        "date": "2017-12-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201712-945"
      },
      {
        "date": "2018-02-15T16:29:02.627000",
        "db": "NVD",
        "id": "CVE-2017-17201"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-02-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-02548"
      },
      {
        "date": "2018-03-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-108200"
      },
      {
        "date": "2018-04-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-012678"
      },
      {
        "date": "2018-02-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201712-945"
      },
      {
        "date": "2024-11-21T03:17:40.330000",
        "db": "NVD",
        "id": "CVE-2017-17201"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-945"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei Vulnerability related to input validation in smartphone software",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012678"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-945"
      }
    ],
    "trust": 0.6
  }
}